ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Global Information Society: Operating Information Systems in a Dynamic Global Business Environment

    ¼öÀÔ
    Global Information Society: Operating Information Systems in a Dynamic Global Business Environment Operating Information Systems In A Dynamic Global Business Environment [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Lan, Yi-Chen / Lan, Yi-Chen | Idea Group Publishing | 2005³â 04¿ù
    77,110¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,320¿ø
    Addresses the importance of information technology management and issues in operating information systems in the global dynamic business environment. This book embraces discussions of the global information technology theory, frameworks and IT architecture, discovery of global knowledge management, ...
  • Wimax Operator's Manual: Building 802.16 Wireless Networks

    ¼öÀÔ
    Wimax Operator's Manual: Building 802.16 Wireless Networks Building 802.16 Wireless Networks [ Hardcover, 2nd Edition ]
    Sweeney, Daniel | Apress | 2005³â 11¿ù
    93,800¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,690¿ø
    * This timely new edition covers technological changes to broadband wireless access, including competing standards to WiMax, mobile entertainment, and new data backup systems.
  • Running Ipv6

    ¼öÀÔ
    Running Ipv6 [ Hardcover ]
    Van Beijnum, Iljitsch | Apress | 2005³â 11¿ù
    93,800¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,690¿ø
    Running IPv6 explains how to install and operate the IPv6 protocol for Windows XP, Mac OS X, FreeBSD, Red Hat Linux, and Cisco routers. The book also covers DNS and BIND, Zebra, Apache 2, and Sendmail. While IPv4 uses 32-bit addresses, IPv6 addresses are 128 bits long, and allow for more unique addr...
  • Active Directory Field Guide

    ¼öÀÔ
    Hunter, Beau | Apress | 2005³â 06¿ù
    54,710¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,740¿ø
    * Task-based, advanced solutions* Discusses non-traditional or out-of-band solutions* Written from real-world knowledge* Focuses on solutions relevant to consultants
  • Five Days To A Security Breakdown!

    ¼öÀÔ
    Smith, Rick | Lightning Source Inc | 2004³â 07¿ù
    21,290¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,070¿ø
  • Negotiating Privacy

    ¼öÀÔ
    Negotiating Privacy The European Union, The United States, And Personal Data Protection [ Hardcover ]
    Heisenberg, Dorothee | Lynne Rienner Pub | 2005³â 07¿ù
    81,310¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,070¿ø
  • CCNP Bcmsn Exam Certification Guide

    CCNP Bcmsn Exam Certification Guide [ Hardcover, 3/E, CD-ROM ]
    David Hucaby | Cisco Press | 2005³â 10¿ù
    55,000¿ø Æ÷ÀÎÆ®Àû¸³ 1,100¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Official self-study test preparation guide for the Cisco BCMSN exam 642-811The official study guide helps you master all the topics on the CCNP BCMSN exam, including:Modular network designSwitch operation and configurationSwitch port configurationVLANs and the VLAN Trunking Protocol (VTP)Aggregating...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Cisco QOS Exam Certification Guide, 2/E

    Cisco QOS Exam Certification Guide, 2/E (IP Telephony Self-Study) [ Hardcover, 2nd Edition ]
    Wendell Odom | Cisco Press | 2004³â 10¿ù
    67,000¿ø Æ÷ÀÎÆ®Àû¸³ 3,350¿ø
    Cisco QOS Exam Certification Guide, Second Edition, is a mid- to late-stage assessment, review, and practice tool for the new IP Telephony QOS exam. It not only prepares you to succeed on the exam, but also in your daily job as a certified networking professional. Revised to eliminate material dropp...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • MPLS and Next-Generation Networks

    MPLS and Next-Generation Networks Foundations for NGN and Enterprise Virtualization [ Paperback ]
    Azhar Sayeed | Cisco Press | 2005³â 10¿ù
    62,400¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,120¿ø
    Understand the business case for deploying MPLS-based services and solutions Provides network managers and architects a precise MPLS primerDefines MPLS service problems and their associated solutionsIncludes ROI models for MPLS-based solutionsDiscusses pros and cons of various options for each MPLS ...
  • What Was It?!: A Short Guide to Understanding and Using Linux, Macintosh and Windows--and Other Stuff

    ¼öÀÔ
    What Was It?!: A Short Guide to Understanding and Using Linux, Macintosh and Windows--and Other Stuff A Short Guide to Understanding and Using Linux, Macintosh and Windows-And Other Stuff [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Leach, Henry, Jr. | iUniverse | 2004³â 03¿ù
    39,520¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,190¿ø
    Learn techniques used for the Linux, Macintosh and Windows operating systems in a quick and easy side-by-side format. Anyone from the beginner to the advanced can benefit by reading What Was It?! There is something for everyone. Learn the language and structure of computing. Learn how to and what ...
  • MINITAB Handbook

    MINITAB Handbook Updated for Release 14 [ Paperback, 5th Edition ]
    Barbara F. Ryan, Brian L. Joiner, Jonathan D. Cryer | Thomson Learning | 2005³â 01¿ù
    32,000¿ø Æ÷ÀÎÆ®Àû¸³ 640¿ø
    Written by developers Barbara Ryan and Brian Joiner, and professor of statistics Jon Cryer, this text illustrates by example and step-by-step instruction how to use MINITAB 14 to explore and analyze data. The book introduces readers to MINITAB software while understanding that they may also be learn...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • The Law and Economics of Cybersecurity

    ¼öÀÔ
    The Law and Economics of Cybersecurity [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Grady, Mark F. / Parisi, Francesco | Cambridge University Press | 2005³â 11¿ù
    214,570¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,440¿ø
    Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both.
  • Introduction to Coding Theory

    Introduction to Coding Theory [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Roth, Ron | Cambridge University Press | 2006³â 02¿ù
    203,020¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,100¿ø
    "Error-correcting codes constitute one of the key ingredients in achieving the high degree of reliability required in modern data transmission and storage systems. This book introduces the reader to the theoretical foundations of error-correcting codes, with an emphasis of Reed-Solomon codes and the...
  • TCP/IP  Essentials

    ¼öÀÔ
    TCP/IP Essentials A Lab-Based Approach [ Hardcover ]
    Panwar, Shivendra S. (EDT) / Mao, Shiwen (EDT) / Ryoo, Jeong-dong (EDT) / Li, Yihan (EDT) | Cambridge Univ Pr | 2004³â 11¿ù
    206,580¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,330¿ø
    A hands-on textbook on TCP/IP technologies, showing how the protocols are implemented in practice.
  • Principles of Embedded Networked Systems Design

    Pottie, Gregory / Kaiser, William | Cambridge University Press | 2005³â 10¿ù
    20,000¿ø Æ÷ÀÎÆ®Àû¸³ 400¿ø
    Embedded network systems provide a set of technologies that can link the physical world to large-scale networks in applications such as seismological monitoring, environmental monitoring, automated manufacturing, border surveillance, and security. Including many examples and homework exercises, this...
  • Networking Wireless Sensors

    ¼öÀÔ
    Networking Wireless Sensors [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Krishnamachari, Bhaskar (University of Southern California) | Cambridge University Press | 2006³â 02¿ù
    186,510¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,600¿ø
    Wireless sensor networks promise an unprecedented fine-grained interface between the virtual and physical worlds. They are one of the most rapidly developing information technologies. Originally published in 2005, this book provides a detailed and organized survey of the field.
  • Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML

    Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML Designing and Developing Mobile Applications with UML and XML [ , POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    B'Far, Reza / Behravanfar, Reza / Lindsay, Phillip | Cambridge University Press | 2004³â 11¿ù
    237,690¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 7,140¿ø
    Explores the differences between mobile and stationary applications and the architectural and software development concepts needed to build mobile applications.
  • Advances in Elliptic Curve Cryptography

    Advances in Elliptic Curve Cryptography [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Blake, Ian F. / Seroussi, Gadiel / Smart, Nigel P. | Cambridge University Press | 2005³â 06¿ù
    140,280¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,210¿ø
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided artic...
  • TCP/IP Essentials

    TCP/IP Essentials A Lab-Based Approach [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Li, Yihan (Polytechnic University, New York) | Cambridge University Press | 2004³â 12¿ù
    140,280¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,210¿ø
    The TCP/IP family of protocols has become the de facto standard in the world of networking. Found in virtually all computer communication systems, they form the basis of today's Internet. Including a series of carefully designed laboratory experiments that span the various elements of protocol defin...
  • Defending the Digital Frontier: Practical Security for Management

    ¼öÀÔ
    Defending the Digital Frontier: Practical Security for Management Practical Security for Management [ Hardcover ]
    Ernst & Young Llp / Babiak, Jan / Butters, John | Wiley | 2004³â 11¿ù
    42,660¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,140¿ø
    Enhance the digital security knowledge--base within any organization In todaya s competitive business environment, information and information technology have become crucial for a companya s success. Ensuring the confidentiality of such information--financial, trade secrets, and the like--has bec...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS14