




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
WHITEPAPER
Akamai
FromWAFtoWAAP:
Akamai’sApproach
toaHolisticAppandAPISecuritySolution
Akamai
Contents
Introduction04
TraditionalaWAF05definitionof
ChallengesWAF06withatraditional
Design—WAFtoWAAP07principles
Akamai’stoWAAP10approach
M10ovingbeyondrulesets
MDDoS10odernizingapplication-layerdefensesbeyondratelimiting
Single11solutionforcomprehensiveprotection
TheAdaptiveSecurityEngine12
Adaptive13threatdetection
A13utomaticupdates
Testingtoensureaccuracy14framework
Automaticself-tuning15
C15onfigurationandautomationflexibility
Verify16intherealworld
I16ntegratingmodernizedprotections
ApplicationsecurityandDDoS18defense
BehavioralDDoSEngine:How19itworks
Applicationaccuracy21security
ClientReputationscores22
Malware23protection
Application24securityanalytics
APIProfiling25Discoveryand
|2
Akamai
|3
Botvisibilityandmitigation27
Bot&APIProtector27visibilityandmitigationintrinsictoApp
Key28botcapabilities
MoreaWAF:29thanBenefitsfromtheAkamaisolution
Threat30intelligenceanddetection
A30kamaiplatformintelligence
Threatresponse31researchandincident
T31hreatresearch
Iresponse31ncident
R31apidthreatdetection
CVE32protection
Globallydistributededgeplatform33
R33eliabilityandresiliency
Global35scale
P35erformance
Edgepowers36platformprotection
ManagedAttackSupport37
SecurityOperationsCommandCenter(SOCC)37
Conclusion38
|4
Akamai
Introduction
Withincreasinglylargeanddiverseattacksurfaces,growingoperationalfriction
andcost,andcontinuouslyevasivemultidimensionalthreats,securityteamsneed
visibilitybeyondthetraditionalwebapplicationfirewall(WAF).Specifically,theyneedmoreautomatedtoolstoincreaseefficiency,anddeeperprotectionsintheappand
applicationprogramminginterface(API)ecosystem.Themoremodernterminology
fortheseprotectionsiswebapplicationandAPIprotection(WAAP).Discerning
organizationsprioritizingthesecurityoftheirbusinessandthesafetyoftheir
customersdemandcomprehensiveprotectionagainstseveralthreatsacrosstheir
entiredigitalestate.Inadditiontoprotectingappsfromknown,unknown,andzero-dayattacks,theseprotectionsinclude:
?Adaptivethreatdetection
?Automatedpolicyupdates
?RobustDDoSdefense
?APIdiscoveryandprotection
?Botvisibilityandmitigation
?Easyintegrationsfordevelopmentlifecycles
ThispaperdiscussesthetraditionalWAFtechnology,theshiftfromWAFtoWAAP,
andthecontinuedmarketdemandthatisevolvingWAAPsolutions.Asanestablishedleaderinthesecurityspace,Akamaifocusesourapproachoninnovatingsecurity
technologiesthatpowerandprotectlifeonlineforendusers.
Akamai
TraditionaldefinitionofaWAF
AtraditionalWAFsitsinthemiddleofthetrafficflowbetweenendusersandaweb
application.TheWAFinspectsunencryptedorencrypted
HTTPtrafficpassingthrough
itforanyattacksasdefinedbyalistofrules.
MostWAFsrelyonapredefinedlistofrulestoidentifymalicious
HTTPrequests
interspersedwithlegitimate
HTTPtraffictoguardagainstthousandsofpotential
knownexploits.Inaddition
,newattackvectorsoradditionalpermutationsofexistingonescontinuouslyevolveandareexploitedbythreatactors.ThisiswhereatraditionalWAFcontinuallyneedstohaveitsrulesupdatedandtunedtothelegitimatetraffic
characteristics,whichwilldifferonaper-applicationbasisandchangeovertime.
Asendusershavedemandedmoreprotectionandperformance,WAFshaveexpandedtheirscopetoincludeadjacentsecuritytechnologiesandserviceslikedistributed
denial-of-service(DDoS)mitigation,APIsecurity,andbotmitigationcapabilities.Thiscontinuingevolutionwarrantsanewdefinitionandnewterminology.
|5
|6
Akamai
ChallengeswithatraditionalWAF
OrganizationswithaWAFoftenclaimthatitfailstomeetinitialexpectationsintermsofeffectiveness,easeofmanagement,andimpactonprotectedapplicationsandAPIs.Duetowebperformanceissuesthatoftenoccurfrominspectingbillionsofweband
APIrequestsformaliciouscode,WAFshaveoftenbeenasourceofintraorganizationalfriction,performancedegradation,andobstructiontodeploymentduetosecurity
protocols.
SomeofthemostsignificantdeploymentchallengeswithtraditionalWAFsstemfromthefollowing:
?Inaccuratedetectionsandhighfalsepositivescreatealertfatigueandadditionalrisk
?WAFsrelyonmanualreview,tuning,andmaintenance
?Lackofgranularcontrolsleadtoheavy-handeddenypoliciesthatinterruptend-userexperienceandbusinessprocesses
?Out-of-datethreatintelligenceincreasesvulnerabilities
?Decreasedperformanceandcoverageduetorestrictionsandinflexibility
?Toolimitedtoprotectdigitalexpansion
TraditionalWAFsareapowerfulsecuritytool.However,theycanoftenleave
organizationswithoperationalpainsandunmitigatedrisksthatwillbeaddressedinthispaper.
OrganizationslookingtoupdatetheirWAFtechnologywithaWAAPsolutionshould
ensurethatthesolutiondeliversbothbusinessvalueandrobustsecurityprotections.TheconversionfromWAFtoWAAPcombinesthispowerofprotectionwith
functionality,efficiencies,andeaseofusetomeetbusinesses’needs,bothforsecurityteamsandotherteams.
|7
Akamai
Designprinciples—WAFtoWAAP
AsthetraditionalWAFproductfocusesonend-userrulecreation,anyvendorcan
buildaWAFsolutionandbringittomarketwithrelativeease,asdemonstratedbytheprevalenceofcommercialofferingsbuiltaroundtheopensourceOpenWorldwide
ApplicationSecurityProjectModSecurityCoreRuleSet(OWASPCRS).
However,itisdifficultforaprovidertodesignacomprehensiveWAAPsolutionthatcan:
?Bedeployedin-linetoprotectapplicationsandAPIsasnewvulnerabilitiesemerge
?Keepupwithmodernappdevelopmentpractices
?ProvideequallystronglayersofDDoSdefense,botmitigation,APIprotection,andclient-sidewebapplicationprotections
AsAkamaiapproachedthedesignofourWAAPsolution,webelieveditshouldbe
morethan“goodenough.”App&APIProtectorwascreatedtoaddresssecurityriskswhilekeepingourcustomerorganizationsfocusedonmajorbusinessobjectives.
Asablueprinttoourdesign,webelievedanidealWAAPsolutionshouldprovide:
Effectivesecurity
Applicationsruneveryaspectofthebusiness.Securingthemagainstmaliceis
thefoundationalgoalofacorporatesecurityteam.SecurityteamsarechallengedtofindaWAAPsolutionthatdeliversbest-of-breeddetectionsinaWAAPsolution.Theidealsecuritytoolprioritizesdetectionefficacy,asitisthemostimportant
aspectofaWAAPsolution,andhasastellartrackrecordofzero-day,exploit,
andCommonVulnerabilitiesandExposures(CVE)defense,aswellasanimpressiveavailabilityhistory.
Accuracy
Securityteamsneedtofindtherightbalanceofmitigatingriskswhileenablingthebusinesstomovewithspeed.Idealsolutionswillhaveself-tuningmechanismsthathelptoreducefalsepositiveswhilenotcompromisingend-userexperienceand
businessprocesses.
Akamai
|8
Modernprotections
Organizationsmustcontinuously(andoftenmanually)updateprotectionstothelatestrulestoaddressnewvulnerabilitiesastheyarediscovered.Todothis,theyneedtwokeyabilities:accesstothelatestintelligenceacrossattackvectorsandskilledsecurityresourcesthatcantailorthedefensestrategytomeetmalleableattacks.Anideal
solutionwillbealeaderinthethreatintelligencecommunityandprovidecapabilitiesthatsimplifysecurityoperationsacrosstheestate’sprotections.
Adaptivity
Thethreatlandscapeevolvesatarapidpace.WithAI-poweredattacksonthehorizon,securityteamsneedtobemoreefficientthaneverintheirsecurityoperations.IdealWAAPsolutionswillhaveacombinationofadvancedautomation,machinelearning,anddeepglobalintelligencetodeliverupdatesautomaticallyandprovidecustomizedrulemodificationsuggestionsthatareimplementedinaclick.
Visibility
TraditionalWAFsolutionstypicallyprovideanever-endingstreamofalertsandrelyonsecuritypractitionerstocarefullyanalyzeeachalertburningthroughin-house
resources.AmoreeffectiveWAAPsolutionprovidesmulti-solutionvisibilityand
proactivecontextaroundattacksbynotifyinganorganizationwhen,where,andhowtheyoccurredtoalleviatetheresourceburden.
Scalability
Asolutionwithoutenoughscaletohandleincomingtrafficcaneasilybecomea
bottleneckthatincreasesweblatencyandhasthepotentialtobreakunderload.AneffectiveWAAPapproachseamlesslyandautomaticallyscalestomatchtrafficdemandsandattacksastheyvaryovertime,andprovidecontinuousprotection
withoutinterruptionorreducedperformance.
Akamai
Cooperation
Aneffectivesecuritysolutionneedstobeintegrableintothecurrentstack,
programmable,simpletouse,andfrictionless.Anidealsolutionbuildsabridgebetweensecurityanddevelopmentteams.
Support
Duringdemandingsecurityevents,organizationsareoftenoverwhelmedbytheskillsandresourcesneededtoprovideatimelyresolution.Anidealsolutionwillhaveregularmanagedserviceoptions,aswellason-demandserviceoptions,thatcanprovide
expertiseandmitigationforcommonscenariosincludingactiveattacks,servicesissues,staffturnover,internalskillsetgaps,andmore.
Withthesedesignprinciplesinmind,let’sexplorehowAkamaiapproachesbuildingourleadingWAAPsolution,App&APIProtector,startingwiththecoretechnology.Oursolutioncombinesmanysecurityproductsinonetoholisticallyaddress
challengesinsecuringapplications,defendingagainstvolumetricDDoSattacks,protectingAPIsacrosstheestate,andcontrollingbottraffic.
|9
|10
Akamai
Akamai’sapproachtoWAAP
Movingbeyondrulesets
AsthemarketmovedfromtraditionalWAFdesignprinciplestothemodernand
effectivesecuritysolutionofWAAP,effectivedetectionandmitigationtechnologyremainedthefocus.
AkamaifirstintroducedourWAFin2009astheworld’sfirstedge-basedWAF.
SecurityvendorsatthistimewereofferingWAFsbasedonstaticrulesetsastheir
foundationfordetections.Akamaidifferentiatedatthattimebybuildingaproprietaryrules-basedenginecalledKonaRuleSet,whichemployedasmallnumberofflexiblerules(ratherthanstaticrules)inconjunctionwithananomalyscoringmodeltobetteraddressaccuracyandvisibilityintoattacks.
Thenin2017,Akamaiintroducedautomatedattackgroups,whicheliminatedthe
needfororganizationstocontinuallyconfigureandupdateruleswithAkamai-managedprotections.Automatedattackgroupswerearevolution,quicklyenabledacross
thousandsofactiveAkamaicustomerWAFpoliciestotakeadvantageofthisnewapproach.
Akamaicontinuedtoevolveourapproachtoapplicationsecurity,prioritizingcombinedapplicationandAPIprotection,includingbotdefensecapabilities,withthelaunchof
App&APIProtectorin2021—thisWAAPsolutionaimedtoreplaceKonaSiteDefenderWAFforenterpriseandgrowingglobalbusinesses.App&APIProtectorchanged
thewayAkamaiapproachedsecurityoperationsbymodernizingtheKonaRuleSettechnologyintotheAdaptiveSecurityEngine.
Modernizingapplication-layerDDoSdefensesbeyondratelimiting
WhenitcomestoDDoS,ratelimitingisaprovenandeffectivetool.Yettheriseof
sophisticatedLayer7DDoSattacks,multi-vectorassaults,andtheexploitationofAPIshaslefttraditionalDDoSdefensesstrugglingtokeepup.Staticdefenses,whichrely
onfixedthresholdsandpredefinedsignatures,arereactiveandpronetofalsepositives,especiallyasattackersincreasinglyblendmalicioustrafficwithlegitimaterequests.
ThisiswhereAkamaichangedtheapproachtoDDoSdefenseandintroducednewinnovationssuchasURLProtectionandtheBehavioralDDoSEngine.
Akamai
|11
The
BehavioralDDoSEngine
isacutting-edgeadditiontoAkamaiApp&APIProtector,joiningtheAdaptiveSecurityEngineasoneofitscoretechnologies.Together,theseenginesofferunprecedentedprotectionagainstmodernthreats,makingAkamaia
leaderinWAAP.Thisdual-engineapproachsetsAkamaiapartbydeliveringautomatedupdates,self-tuningcapabilities,andcontext-awaredetectionforahands-off
experience.
Singlesolutionforcomprehensiveprotection
Today,changecontinuestoredefineapplicationsecuritywithmoderndevelopmentpracticesviaserverlessedgecomputing,microservices-basedarchitectures,single-pageapplications,andSaaS/IaaS/PaaS/FaaSapproachesbeingusedthatshape
applicationsecurity.
ToprotectmodernapplicationsandAPIsincomplexITenvironments,Akamaire-architectedourapplicationsecuritytechnologywithamoreadaptive,flexible,andholisticapproach.AsAkamai’sWAAPsolutionmigratedfromWebApplication
ProtectorandKonaSiteDefendertoApp&APIProtector,moresecuritycapabilitiesandfeaturedtoolsetswereincorporated.
App&APIProtectornowprovidesmanyadditionalsecurityenhancements,allofwhicharevisibleandcontrolledviaasingleinterface.Akamai’sWAAPsolutioncombines:
1.AnAdaptiveSecurityEngine
2.Applicationsecuritywithgranularcontrols
3.DDoSdefense,includingadvancedLayer7DDoSprotection
4.APIprotection,includingdiscoveryandPIIprotectionfeatures
5.Botvisibilityandmitigationcapabilities
6.Aplatformforglobalscale,threatintelligence,andresiliency
|12
Akamai
TheAdaptiveSecurityEngine
TheAdaptiveSecurityEngineprovidesnext-generationprotectionattheintersectionofmachinelearning(ML),real-timesecurityintelligence,cybersecurityexperts,
andadvancedautomation.AsAkamai’scoretechnologyfordetectionanddefense,theAdaptiveSecurityEngineenablesahands-offapproachtoprotectentirewebapplicationsandAPIestates.ItalsoaddstoAkamai’sadvancementsfromWAF
toWAAP,whichincorporatecorrelatingsecuritysolutionsincludingbotmanager,DDoSprotection,DevOpsintegrations,andmore.
Machine
learning
Adaptive
SecurityEngine
Technologybeyond
aWAFrulesetfor
intelligent,proactive
modernization
9PBintelligencedatabase
Advanced
automation
threathunters
400human
TheAdaptiveSecurityEngineisuniquebecauseitlearnstrafficandattackpatterns
uniquetoeachcustomer,analyzesthecharacteristicsofeveryrequestinrealtime,
andusesthatknowledgetointerceptandadapttofuturethreats.Itusesthesame
platforminsightandintelligencetoreducefalsepositivesviatuningrecommendations.Thisself-tuningfeatureofferseaseofusebysecurityanddevelopmentteamsby
deliveringadaptivethreatprotectionsasproactiveupdates.
Akamai
|13
Adaptivethreatdetection
Theengineemploysamultidimensionalthreatscoringmodelthatcombinesplatformintelligencewithdata/metadatafromeachrequest.Thisdataisactionedwith
decision-makinglogictoaccuratelyidentifytrueattacks.
Adaptivedetectionsareespeciallyeffectiveinidentifyinghighlytargeted,evasive,
andstealthyattackssincesophisticatedattackersinvestmoretimeandeffortintheirapproach.Asattackersscanforvulnerabilitiesandmisconfigurations,theAdaptive
SecurityEnginecollectsandcorrelatesevidenceabouttheirtacticstomakeattackers’historicalfingerprintsmoreidentifiable.
Inadditiontotheactualpayloadanditslocationwithintherequest,otherexamplesofattackdimensionsitevaluatesforeachclientinclude:
?Ahistoryofreconnaissanceand/orattacks(e.g.,frequency,magnitude,severity)
?Anysignofmaliciousautomationandattacktooling
?Correlationtoknownsourcesofattacktraffic
Moreover,theAdaptiveSecurityEngineisenhancedwithtwoproprietarytechnologies:SmartDetect,whichtokenizestheinputintoafingerprintforhighlyaccuratedetection,andSmartSniff,whichdetectstherightcontenttypeoftherequestbodytoprevent
contentmanipulationandbypass.AkamaithreatresearchersleverageAkamai’sexpansiveinfrastructureandsystemstopassivelyrunnewdetectionsacrossallproductiontrafficandthenanalyzethoseresultsusingMLmodels.
Automaticupdates
Manyorganizationstodayhaveinsufficientresourcesorsecurityexpertiseto
continuouslytrackdevelopingthreats,updateconfigurations,andretestagainst
theirwebtraffictooptimizepolicies.Inresponse,AkamaicontinuouslyupdatestheAdaptiveSecurityEngineusinganAI/MLautomatictestingframeworktoaccountforchangingthreatswhilemaintaininghighaccuracy.Theseupdateshaveoften
protectedagainstzero-dayattacksbeforetheywereannounced.
|14
Testingframeworktoensureaccuracy
TestingaWAAPsolutionreliesonasimplepremise:Testdifferentattackvectorsandstopwebattacks.However,thefollowingfactorsneedtobeconsidered:
?Real-worldenvironmentsaremorecomplexthantestenvironmentsandoftenleadtofalsepositivesandfalsenegatives.
?Designingatestingframeworkwithaccuracyinmindrequiresadditional
verification—notjustattackdetection,butdoingsowithoutinadvertentlytriggeringfalsepositivesorfalsenegatives.
?Testingrequirestheuseofrealwebtraffic—bothlegitimateandattacktraffic.
AdaptiveSecurityEngineupdatesconsistofmultiplestagestoensurelegitimatetrafficisnotadverselyimpacted:
?Alldetectionsarelabtestedusingsynthetictraffictoensuretheyproperlycatchattackswhilenotintroducingfalsepositives.
?Updatesarethentestedonliveproductiontraffictoensurethesampleisvalidforcurrentplatformtraffic.Thisprocessinvolvesrunningtheupdateinshadowmodeonrealcustomertraffic.Runninginshadowmodeensuresnoimpacttocustomertrafficwhilestillrunningtestdetectionaccuracy.
?Onceanupdatehaspassedstagetwo,MLidentifiespatternsortriggersthathumananalysismayhavemissed,afterwhichtheThreatResearchTeam
manuallyreviewsresults.
?Onlywhenthesechecksarepassedateachphasecanachangemovetothe
nextphaseandbedeployedtoalargersegmentofthenetwork.After100%
deployment,self-tuningcapabilitieswilleliminateanyremainingfalsepositivesparticulartocustomers’trafficpatterns.
|15
Automaticself-tuning
Automaticself-tuningalleviatestheburdenofmanualtuning,whichcanleadto
outdatedpoliciesandhumanerror,foranear-hands-offexperience.TheAdaptive
SecurityEngineappliesML,statisticalmodels,andheuristicsacrossalltriggersforeachsecuritypolicytoaccuratelydifferentiatebetweenrealattacksandend-user
trafficmisidentifiedasattacks.Itisnotagenericplatform-widecheckthatisappliedonlyduringonboarding,butratheracontinuoustuningprocessperformed24/7/365withnoend-userconfigurationorintervention.
Self-tuningisfrictionlessandsimple.Securityadministratorscaneasilyreview
andacceptrecommendationswithoneclickviatheuserinterface,ortheycan
automateusingAppSecAPIs,command-lineinterface(CLI),orTerraform.Forgreatertransparency,apre-filteredlinktoWebSecurityAnalyticsshowsallrequestsdeemedasfalsepositiveswitharationaleprovidedforeachtuningrecommendation.
Configurationandautomationflexibility
WhenaWAAPsolutionvendormovespastthetraditionalrulesettechnology,
configurationandautomationbecomemoreflexible.TheAdaptiveSecurityEnginegrantstheabilityto:
?HavedifferenttypesofWAFupdates(autovs.manual)fordifferentapplicationsandtheirassociatedriskappetite
?Controlactionperattackgroupandcontributingrulenecessaryforcustomizationifapplication/trafficbehaviorisnotstandard
?SetupsimpleandcomplexconditionsfordifferentrequestcharacteristicssuchasIP,geo,header,payload,etc.
?ProactivelymitigatethreatsourcesthathavebeendetectedcarryingoutsuspiciousWAFattack/scanningforyourownapps,withPenaltyBox
?Modifydebugheader
?Modifyrequestpayloadinspectionsizeorattackpayloadloggingsettings
?Runsimulationsofchangeindetectionlogictoconfidentlypushthesechangesonproduction
Akamai
|16
Verifyintherealworld
EvaluationmodeprovidesAkamaicustomerswithflexibilityandgranularityin
configuringspecificAdaptiveSecurityEngineversionsandtestingupdatesornewrules/policies.Customerscanseenewupdatesorchangesbeforechoosingto
enableasappropriateornecessaryfortheirspecificwebapplicationenvironment.Foreffectivesecuritymodernization,Akamaibelievesthattestingonreal-timetrafficimprovessecurityoutcomesovertestingonpasttraffic.Evaluationmodeissimilartoapplyingashadowrulewhereyoucanseethereal-timeresultsasifthepolicy
wereenforced—yetwithnoimpacttocurrentendusers.Organizationscanoptforthismanual/evaluationmodeofoperationtominimizeunexpectedimpactonfalsepositivesandfalsenegatives.
Integratingmodernizedprotections
SecurityandDevOpsteamscanalsooperationalizesecuritybyintegratingcallstoAkamaiAPIsusingtheCLI,AkamaiTerraform,orscriptsintheirCI/CDautomation
pipeline.Configurationandautomationflexibilityensurethatpowerfulsecurityneverhindersdevelopmentvelocity.Theseintegrationscan:
?Enablerapidonboardapplications
?Provideuniformmanagementofsecuritypoliciesacrosslargeapplicationportfolios
?Centralizesecurityenforcementacrosshybridandmulticloudinfrastructures
?ImprovecollaborationbetweenDevOpsandsecurityteamsinaGitOpsworkflowforoptimalcoverage
Akamai
Additionally,securityinformationandeventmanagement(SIEM)allowsyoutocollectsecurityeventsthattakeplaceontheAkamaiplatform.Inturn,ourSIEMIntegrationsolutionpr
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 福建省莆田市莆田第二十五中學(xué)2024?2025學(xué)年高一下學(xué)期3月月考 數(shù)學(xué)試題(含解析)
- 急救藥品相關(guān)知識考核試題
- 遼寧師范大學(xué)《平面廣告設(shè)計》2023-2024學(xué)年第二學(xué)期期末試卷
- 四川省自貢市曙光中學(xué)2024-2025學(xué)年初三下學(xué)期第二次段考物理試題試卷含解析
- 山東省郯城縣重點名校2025年第二學(xué)期初三第二次模擬考試語文試題含解析
- 山東省棗莊市滕州市2024-2025學(xué)年初三下學(xué)期開學(xué)摸底考試化學(xué)試題含解析
- 遼寧建筑職業(yè)學(xué)院《廣播電視敘事學(xué)》2023-2024學(xué)年第一學(xué)期期末試卷
- 曲阜遠(yuǎn)東職業(yè)技術(shù)學(xué)院《特殊兒童早期干預(yù)》2023-2024學(xué)年第一學(xué)期期末試卷
- 武漢工程大學(xué)郵電與信息工程學(xué)院《微分幾何實驗》2023-2024學(xué)年第二學(xué)期期末試卷
- 豫東名校2025年第二學(xué)期高三期末考試歷史試題試卷含解析
- 子宮脫垂護理
- CHT 8023-2011 機載激光雷達(dá)數(shù)據(jù)處理技術(shù)規(guī)范
- 河北省唐山市路北區(qū)2023-2024學(xué)年八年級下學(xué)期4月期中物理試題
- 2024屆高中語文高考作文資料及素材系列
- 醫(yī)院各科室物品采購清單
- 中國镥-177(Lu-177)市場發(fā)展現(xiàn)狀和未來五年前景分析
- 【中學(xué)生數(shù)學(xué)學(xué)習(xí)習(xí)慣和學(xué)習(xí)狀況調(diào)研探析報告9900字(論文)】
- 舞蹈就業(yè)能力展示
- 2024福建省能源石化集團有限責(zé)任公司校園招聘筆試參考題庫附帶答案詳解
- 《鐵線蓮圖鑒》課件
- 內(nèi)科護理學(xué)-急性胰腺炎--1課件
評論
0/150
提交評論