ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Multimedia Encryption and Authentication Techniques and Applications

    Borko Furht, Darko Kirovski | Auerbach Publications | 2006³â 05¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications c...
  • Quantum Error Correction and Fault Tolerant Quantum Computing

    ¼öÀÔ
    Gaitan, Frank (Southern Illinois University, Carbondale, USA) | CRC Press | 2008³â 02¿ù
    220,270¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,020¿ø
    Offers an explanation of how quantum error correction is possible and how quantum stabilizer codes are constructed. This book demonstrates how fault-tolerant quantum operations can be implemented on encoded quantum information and presents the accuracy threshold theorem for particular noise models.
  • Interactive Graphics for Data Analysis

    ¼öÀÔ
    Interactive Graphics for Data Analysis Principles and Examples [ Hardcover, 1st Edition ]
    Urbanek, Simon | Chapman and Hall/CRC | 2008³â 10¿ù
    174,190¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,710¿ø
    Discusses exploratory data analysis (EDA) and how interactive graphical methods can help gain insights as well as generate new questions and hypotheses from datasets. This book summarizes principles and methodology, demonstrating how the different graphical representations of variables of a dataset ...
  • Adversarial Reasoning

    Adversarial Reasoning Computational Approaches to Reading the Opponent¡¯s Mind [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Kott, Alexander / McEneaney, William | Chapman and Hall/CRC | 2006³â 07¿ù
    260,320¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,020¿ø
    Featuring approaches that draw from disciplines such as artificial intelligence and cognitive modeling, Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind describes technologies and applications that address a broad range of practical problems, including military planning...
  • C++ for Mathematicians

    ¼öÀÔ
    C++ for Mathematicians An Introduction for Students and Professionals [ Paperback, CD-Rom ]
    Scheinerman, Edward (Johns Hopkins University, Baltimore, Maryland, USA) | CRC Press | 2006³â 06¿ù
    174,190¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,710¿ø
    Suitable for mathematical undergraduate coursework as well as self-study, this work on C++ programming emphasizes the essential role of practice as part of the learning process. It contains various chapters that provide many problems and solutions. It features an accompanying CD ROM that provides va...
  • Computational Methods in Biomedical Research

    ¼öÀÔ
    Naik, Dayanand(EDT) | Taylor & Francis Inc | 2007³â 12¿ù
    242,560¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,130¿ø
    Using real-world data from disease areas, such as cancer and HIV, this book explores important computational statistical methods that are employed in biomedical research. It discusses microarray data analysis, machine learning techniques, and mass spectrometry-based protein profiling.
  • Introduction to Bioinformatics

    Introduction to Bioinformatics [ Paperback, 1st Edition, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Tramontano, Anna | Chapman and Hall/CRC | 2006³â 12¿ù
    150,160¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 7,510¿ø
    From the elucidation and analysis of a genomic sequence to the prediction of a protein structure and the identification of the molecular function, this book describes the rationale and limitations of the bioinformatics methods and tools that can help solve biological problems. It addresses the ways ...
  • Effective Computational Methods for Wave Propagation

    ¼öÀÔ
    Kampanis, Nikolaos A. / Dougalis, Vassilios / Ekaterinaris, John A. | Chapman and Hall/CRC | 2008³â 02¿ù
    350,430¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 17,530¿ø
    Presents several modern, valuable computational methods used to describe wave propagation phenomena in selected areas of physics and technology. This book begins with the simulation of nonlinear dispersive waves from nonlinear optics and the theory and numerical analysis of Boussinesq systems.
  • Handbook of Dynamic System Modeling

    ¼öÀÔ
    Fishwick, Paul A.(EDT) | Chapman and Hall/CRC | 2007³â 05¿ù
    350,430¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 17,530¿ø
    Explores the various types of modeling methods available for dynamical systems. This work begins with the general concepts, representations, and philosophy of dynamic models, followed by a section on modeling methodologies that explains how to portray designed models on a computer.
  • Pattern Discovery in Bioinformatics

    ¼öÀÔ
    Pattern Discovery in Bioinformatics Theory & Algorithms [ Hardcover, 1st Edition ]
    Parida, Laxmi | Taylor & Francis Inc | 2007³â 07¿ù
    200,590¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,030¿ø
    Offers the tools to study the regularities in biological data. This book explores various data patterns, including strings, clusters, permutations, topology, partial orders, and boolean expressions. It also reviews basic statistics, including probability, information theory, and the central limit th...
  • Introduction to Network Security

    Introduction to Network Security [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Jacobson, Douglas | Chapman and Hall/CRC | 2008³â 11¿ù
    194,220¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 9,720¿ø
    Discusses network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. This book provides an understanding of the vulnerabilities and mechanisms of each layer of network security. It also presents homework probl...
  • Genetic Algorithms and Genetic Programming

    Genetic Algorithms and Genetic Programming Modern Concepts and Practical Applications [ Hardcover ]
    Affenzeller, Michael / Wagner, Stefan / Winkler, Stephan | Chapman and Hall/CRC | 2009³â 04¿ù
    380,470¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 19,030¿ø
    Describes several generic algorithmic concepts that can be used in various kinds of GA or with evolutionary optimization techniques. This title provides a better understanding of the basic workflow of GAs and GP, encouraging readers to establish new bionic, problem-independent theoretical concepts.
  • Handbook of Parallel Computing

    ¼öÀÔ
    Handbook of Parallel Computing Models, Algorithms and Applications [ Hardcover, 1st Edition ]
    Rajasekaran, Sanguthevar (EDT) / Reif, John (EDT) | CRC Pr I Llc | 2007³â 12¿ù
    344,730¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 17,240¿ø
    Parallel computing plays a vital role in solving complex computing problems. This book provides comprehensive coverage on various aspects of parallel computing, focusing on the foundational principles and advances in the areas of models, algorithms, and applications. It addresses applications to com...
  • Introduction to Cryptography

    Introduction to Cryptography [ Hardcover, 2nd Edition ]
    Mollin, Richard A. | Chapman and Hall/CRC | 2006³â 09¿ù
    194,220¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 9,720¿ø
    Includes two chapters on various applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. This book provides information on cryptanalysis, primalit...
  • Theoretical Introduction to Numerical Analysis

    ¼öÀÔ
    Tsynkov, Semyon V. | Chapman and Hall/CRC | 2006³â 11¿ù
    210,250¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,520¿ø
    Presents an account of the fundamentals of numerical analysis. Using numerical methods from real analysis, linear algebra, and differential equations, this text explain basic concepts, such as error, discretization, efficiency, complexity, numerical stability, consistency, and convergence. It addres...
  • Fundamentals of Natural Computing

    Fundamentals of Natural Computing Basic Concepts, Algorithms, and Applications [ Hardcover ]
    de Castro, Leandro Nunes | Chapman and Hall/CRC | 2006³â 06¿ù
    160,170¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,010¿ø
    Contains theoretical and philosophical discussions, pseudocodes for algorithms, and computing paradigms that illustrate how computational techniques can solve complex problems, simulate nature, explain natural phenomena, and allow the development of new computing technologies.
  • Frontiers in Interpolation and Approximation

    Govil, N. K. / Mhaskar, H. N. / Mohapatra, Ram N. | Chapman and Hall/CRC | 2006³â 07¿ù
    460,570¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 23,030¿ø
    Written by authoritative international mathematicians, this book presents many important results in classical analysis, wavelets, and interpolation theory. Some topics covered are Markov inequalities for multivariate polynomials, analogues of Chebyshev and Bernstein inequalities for multivariate pol...
  • How to Achieve 27001 Certification: An Example of Applied Compliance Management

    ¼öÀÔ
    How to Achieve 27001 Certification: An Example of Applied Compliance Management An Example of Applied Compliance Management [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Arnason, Sigurjon Thor / Willett, Keith D. | Auerbach Publications | 2007³â 11¿ù
    187,020¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 9,360¿ø
    Offering tips, strategies, and basic explanations, this title provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. It presents questions and answers to determine information security strengths and weaknesse...
  • Pervasive Computing in Healthcare

    ¼öÀÔ
    Pervasive Computing in Healthcare [ Hardcover, 1st Edition ]
    Bardram, Jakob E.(EDT) | CRC Press | 2006³â 11¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    Begining with an overview of healthcare, diseases, disabilities, and computer science principles, this work describes challenges in using computers in large, modern hospitals, how software and hardware technology is evolving to meet these challenges, and the pervasive technologies for people with co...
  • Eaches or Pieces Order Fulfillment, Design, and Operations Handbook

    ¼öÀÔ
    Mulcahy, David E. | Auerbach Publications | 2006³â 12¿ù
    220,270¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,020¿ø
    This handbook was created for direct marketing and retail store fulfillment operations that handle "pieces or eaches" as customer orders. It provides insights and tips for small item and flatware warehouse, distribution, plant, or logistic center professionals to make their logistic segments and mat...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS8