ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Moving To The Linux Business Desktop (with CD-ROM)

    Marcel Gagne, Marcel Gagni | Addison-Wesley Professional | 2004³â 09¿ù
    35,150¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,760¿ø
    A respected "Linux Journal" columnist walks readers step by step through planning and managing the transition, getting users up and running, and keeping them happy. Writing for system administrators and other IT professionals, Gagne covers hardware, productivity applications, messaging, coexistence ...

    ÀϽÃÇ°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Introduction to Data Communications and Networking

    ¼öÀÔ
    Tomasi, Wayne | Prentice Hall | 2004³â 04¿ù
    396,120¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 19,810¿ø
    Provides a comprehensive coverage of data communications fundamentals, telephone system operation, local area networks, internetworking, and Internet communications. This book includes questions and problems at the end of each chapter, and provides answers to selected problems at the end of the book...
  • Java Cryptography Extensions: Practical Guide for Programmers

    ¼öÀÔ
    Java Cryptography Extensions: Practical Guide for Programmers Practical Guide for Programmers [ Paperback ]
    Weiss, Jason | Morgan Kaufmann Publishers | 2004³â 06¿ù
    53,080¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,660¿ø
    Discusses cryptography at the level that developers need to know to work with the JCE and with their own applications. This book covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certifi...
  • Oracle Database 10g Ocp Certification All-In-One Exam Guide with CD-ROM

    John Watson, Damir Bersinic | McGraw-Hill Osborne | 2005³â 09¿ù
    66,500¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,330¿ø
    The Most Authoritative OCA/OCP Exam Guide Available Prepare to pass the OCA and OCP Oracle Database 10g certification exams with help from this Oracle Press guide. With complete coverage of all the material on Exam #1Z0-042 Oracle Database 10g: Administration I and Exam #1Z0-043 Oracle Database 10g:...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Survey Of Operating Systems

    ¼öÀÔ
    Survey Of Operating Systems [ Paperback, 2ND ]
    Holcombe, Jane / Holcombe, Charles | McGraw-Hill College | 2005³â 01¿ù
    229,320¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,470¿ø
    Offers a survey of various major microcomputer operating systems, through real-world case studies, annotated illustrations, and step-by-step tutorials, and projects. This title is designed for IT students who want to learn how to install, configure, and troubleshoot operating systems. It also teache...
  • Gray Hat Hacking

    ¼öÀÔ
    Gray Hat Hacking The Ethical Hacker's Handbook [ Paperback ]
    Eagle, Chris / Harper, Allen / Harris, Shon / Ness, Jonathan / Lester, Michael | McGraw-Hill Osborne Media | 2004³â 11¿ù
    71,210¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,570¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Provides guidance to analyze your company's vulnerability to hacks. This work helps to discover security tools and techniques such as fuzzing, reverse engineering, and binary scanning. It offers technical information being utilized by the network engineers, security auditors, programmers, and vulner...

    ÀýÆÇ

    °³Á¤ÆÇ º¸±â ¸®½ºÆ®¿¡ ³Ö±â
  • Mike Meyers' Network+ Guide To Managing And Troubleshooting Networks

    ¼öÀÔ
    Meyers, Mike / Acuna, Martin | McGraw-Hill College | 2004³â 08¿ù
    133,220¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,670¿ø
    Helps to practice the concepts with over 40 labs that challenge students to solve real world problems with learned concepts. Avoiding a "click-by-click" approach, this manual enables teachers to assess their students' knowledge of the subject and give students a way to practice their skills.
  • CWNA Certified Wireless Network Administrator Official Study Guide

    Planet3 Wireless | McGraw-Hill Osborne Media | 2005³â 06¿ù
    86,000¿ø Æ÷ÀÎÆ®Àû¸³ 4,300¿ø
    Written by the company that created the Certified Wireless Network Administrator program, this official study guide provides all the information you¡¯ll need to help you pass the exam. Get an introduction to wireless LANs and radio frequency technology. Learn about wireless LAN infrastructure device...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Sun Certified System Administrator for Solaris 10 Study Guide (Exams CX-310-200 & CX-310-202) [With CDROM]

    Sanghera, Paul | McGraw-Hill Education | 2005³â 07¿ù
    60,630¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,040¿ø
    Primarily Written for those who want to earn the Sun Certified System Administrator (SCSA) certification for Solaris 10, this guide presents full coverage of the official objectives for both the required exams: CX-310-200 and CX-310-202. In spite of the laser sharp focus on the exam objectives, this...
  • LAN Wiring

    ¼öÀÔ
    LAN Wiring [ Paperback ]
    Trulove, James | McGraw-Hill Education Tab | 2005³â 09¿ù
    131,070¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,560¿ø
    A guide to cable installation for voice and data, it provides installers with the details of proper LAN cabling and gives network and IT managers the basics of LAN hardware connection.
  • Ethernet in the First Mile: The IEEE 802.3ah Efm Standard

    ¼öÀÔ
    Ethernet in the First Mile: The IEEE 802.3ah Efm Standard The Ieee 802.3ah Efm Standard [ Hardcover ]
    Beck, Michael | McGraw-Hill Companies | 2005³â 06¿ù
    168,880¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,450¿ø
    IEEE standard 802.3, Ethernet in the First Mile (EFM), standardizes broadband Ethernet, allowing service providers to focus on providing critical broadband services without worrying about interoperability conflicts. This book annotates and explains the language of the standard document, and explains...
  • Wimax Handbook: Building 802.16 Networks

    Wimax Handbook: Building 802.16 Networks Building 802.16 Wireless Networks [ Hardcover ]
    Ohrtman, Frank | McGraw-Hill Companies | 2005³â 05¿ù
    78,000¿ø Æ÷ÀÎÆ®Àû¸³ 1,560¿ø
    Wi-MAX is a big deal because it¡¯s cheaper, smaller, simpler and easier to use than any existing broadband option (DSL, cable, fiber, 3G wireless) ? it also bypasses the existing wired infrastructure and legacy service providers (i.e. the phone and cable companies). This book provides a basic techni...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Telecom Crash Course

    ¼öÀÔ
    Telecom Crash Course [ Paperback, 2nd Edition ]
    Shepard, Steven | McGraw-Hill | 2005³â 06¿ù
    71,230¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,570¿ø
  • How to Buy, Sell, and Profit on Ebay: Kick-Start Your Home-Based Business in Just Thirty Days

    ¼öÀÔ
    How to Buy, Sell, and Profit on Ebay: Kick-Start Your Home-Based Business in Just Thirty Days Kick-Start Your Home-Based Business in Just Thirty Days [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Ginsberg, Adam | William Morrow & Company | 2005³â 05¿ù
    24,730¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 750¿ø
    Armed with just a computer and 1,000 pounds of excess inventory, Adam Ginsberg turned a small local billiards shop into a multi-million-dollar international business virtually overnight.By 2002 Ginsberg was eBay's number one new seller and quickly achieved the status of eBay Titanium PowerSeller. Wi...
  • Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

    ¼öÀÔ
    Foster, James C. | Syngress Publishing | 2005³â 03¿ù
    85,920¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,300¿ø
    Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in C/C++, Java, Perl and NASL; Sockets - the technology that allows programs and scripts to communicate over a network is sockets; and, Shellcode which is commonly defined as byteco...
  • Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code

    ¼öÀÔ
    Erbschloe, Michael | Butterworth-Heinemann | 2004³â 11¿ù
    99,990¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,000¿ø
    Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professio...
  • Network Security Fundamentals : An Introduction to the Key tools and Technologies used to secure network access

    Gert de Laet, Gert Schauwers | Cisco Press | 2004³â 09¿ù
    64,000¿ø Æ÷ÀÎÆ®Àû¸³ 3,200¿ø
    An introduction to the key tools and technologies used to secure network access* Examine common security vulnerabilities and the defenses used to protect network resources* Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates* Learn how to de...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • All-in-One CISSP Certification Exam Guide

    All-in-One CISSP Certification Exam Guide [ Hardcover, CDÆ÷ÇÔ, 2nd Ed. ]
    Shon Harris | McGraw Hill/Osborne | 2003³â 06¿ù
    54,150¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,710¿ø
    Statistics can be misleading, but last year, security professionals who earned (ISC)2 CISSP certification reported earning an average $7,140 raise as a result. That’s the second highest payback of 37 credentials studied by Certification magazine, and it reflects a first-year ROI of 7.9 to 1. Over th...

    ÀϽÃÇ°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Networking in the Internet Age

    Dennis, Alan | Wiley | 2002³â 01¿ù
    35,000¿ø Æ÷ÀÎÆ®Àû¸³ 700¿ø
    This reorganization of "Data Communications and Networking, 7th Edition" focuses more strongly on the internet. It provides a streamlined text concentrated on the internet for use in internet-centric courses, e-commerce programmes, MBA courses and short courses.
  • Internet Technologies Handbook: Optimizing the IP Network

    Miller, Mark A. | Wiley-Interscience | 2004³â 01¿ù
    59,000¿ø Æ÷ÀÎÆ®Àû¸³ 1,770¿ø
    Internet Technologies Handbook: Optimizing the IP Network addresses the need for a solid understanding of the operation of IP networks, plus optimization and management techniques to keep those networks running at peak performance.

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS5