ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Probabilistic Modeling in Bioinformatics and Medical Informatics

    ¼öÀÔ
    Probabilistic Modeling in Bioinformatics and Medical Informatics [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Husmeier, Dirk / Dybowski, Richard / Roberts, Stephen | Springer | 2004³â 12¿ù
    272,500¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,180¿ø
    Probabilistic Modelling in Bioinformatics and Medical Informatics has been written for researchers and students in statistics, machine learning, and the biological sciences. The first part of this book provides a self-contained introduction to the methodology of Bayesian networks. The following part...
  • Strength or Accuracy: Credit Assignment in Learning Classifier Systems

    ¼öÀÔ
    Kovacs, Tim | Springer | 2004³â 03¿ù
    272,500¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,180¿ø
    The Distinguished Dissertations series is published on behalf of the Conference of Professors and Heads of Computing and the British Computer Society, who annually select the best British PhD dissertations in computer science for publication. The dissertations are selected on behalf of the CPHC by a...
  • Data Mining in Bioinformatics

    Data Mining in Bioinformatics [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Wang, Jason T. L. / Zaki, Mohammed J. / Toivonen, Hannu | Springer | 2004³â 10¿ù
    ±¸¸ÅÇýÅÃ
    ¿°°¡ÆǸŵµ¼­/¹ÝÇ°ºÒ°¡
    272,500¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,180¿ø
    Written especially for computer scientists, all necessary biology is explained. Presents new techniques on gene expression data mining, gene mapping for disease detection, and phylogenetic knowledge discovery.
  • Computer Vision Beyond the Visible Spectrum

    ¼öÀÔ
    Computer Vision Beyond the Visible Spectrum [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Bhanu, Bir / Pavlidis, Ioannis | Springer | 2004³â 11¿ù
    272,500¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,180¿ø
    Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision ...
  • Cybercrime

    ¼öÀÔ
    Cybercrime A Reference Handbook [ Hardcover ]
    Martin, Clemens | Bloomsbury Publishing Plc | 2004³â 10¿ù
    98,710¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,940¿ø
    Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know.
  • Data Mining VI: Data Mining, Text Mining and Their Business Applications

    ¼öÀÔ
    Data Mining VI: Data Mining, Text Mining and Their Business Applications Data Mining, Text Mining And Their Business Applications [ Hardcover ]
    Zanasi, A. / Brebbia, C. A. / Ebecken, N. F. F. | Witpress | 2005³â 04¿ù
    676,640¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 33,840¿ø
    This book contains most of the papers presented at the Sixth International Conference on Data Mining held in Skiathos, Greece. Twenty-five countries from all the continents are represented in the papers published in the book, offering a real multinational and multicultural range of experiences and i...
  • Computer Aided Optimum Design In Engineering IX

    ¼öÀÔ
    Hernandez, S. (EDT) / Brebbia, C. A. (EDT) | Computational Mechanics | 2005³â 04¿ù
    589,470¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 29,480¿ø
    This book contains most of the papers presented at the Ninth International Conference on Computer Aided Optimum Design in Engineering (OPTI IX) held in Skiathos, Greece in May 2005. The papers range from innovations in numerical methods, enhancing the current capabilities of existing algorithms to p...
  • Innovation Management In The ICT Sector

    ¼öÀÔ
    Innovation Management In The ICT Sector How Frontrunners Stay Ahead [ Paperback ]
    Huizenga, Edward I. | Edward Elgar Pub | 2005³â 06¿ù
    77,450¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,880¿ø
    Edward Huizenga explores how knowledge and service intensive companies can thrive on innovation and entrepreneurship in the ICT sector.
  • Technological Transitions And System Innovations

    ¼öÀÔ
    Technological Transitions And System Innovations A Co-evolutionary And Socio-technical Analysis [ Hardcover ]
    Geels, Frank W. | Edward Elgar Pub | 2005³â 04¿ù
    250,580¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,530¿ø
    This important book addresses how long term and large scale shifts from one socio-technical system to another come about, using insights from evolutionary economics, sociology of technology and innovation studies.
  • The Cryptogic Password Protocol

    ¼öÀÔ
    The Cryptogic Password Protocol [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Gilbertson, Sean / Bhamidipati, Murli | New Generation Publishing | 2004³â 05¿ù
    17,540¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 530¿ø
    Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome t...
  • The Constitution of Private Governance: Product Standards in the Regulation of Integrating Markets

    ¼öÀÔ
    The Constitution of Private Governance: Product Standards in the Regulation of Integrating Markets Product Standards in the Regulation of Integrating Markets [ Hardcover ]
    Schepel, Harm | Bloomsbury Publishing PLC | 2005³â 02¿ù
    243,000¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,150¿ø
    The book offers the first systematic treatment of European, American and international 'standards law' in the English language.
  • Law, Economics and Cyberspace

    ¼öÀÔ
    Law, Economics and Cyberspace The Effects of Cyberspace on the Economic Analysis of Law [ Hardcover ]
    Elkin-Koren, Niva / Salzberger, Eli M. | Edward Elgar Pub | 2004³â 07¿ù
    167,050¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,360¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Argues that the internet revolution should exert a far more significant influence on economic thinking and on the perception of law.

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Articulation and Intelligibility

    ¼öÀÔ
    Articulation and Intelligibility [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Allen, Jont / Juang, B. H. (EDT) | Morgan & Claypool | 2005³â 06¿ù
    56,100¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,690¿ø
    Immediately following the Second World War, between 1947 and 1955, several classic papers quantified the fundamentals of human speech information processing and recognition. In 1947 French and Steinberg published their classic study on the articulation index. In 1948 Claude Shannon published his fam...
  • Recognition of Humans And Their Activities Using Video

    ¼öÀÔ
    Recognition of Humans And Their Activities Using Video [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Roy-chowdhury, Amit K. / Chellappa, Rama / Zhou, Shaohua K. / Bovik, Al (EDT) | Morgan & Claypool | 2005³â 06¿ù
    56,100¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,690¿ø
    The recognition of humans and their activities from video sequences is currently a very active area of research because of its applications in video surveillance, design of realistic entertainment systems, multimedia communications, and medical diagnosis. In this lecture, we discuss the use of face ...
  • How to Cheat at It Project Management

    ¼öÀÔ
    Snedaker | Syngress Publishing | 2005³â 08¿ù
    75,860¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,800¿ø
    Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.
  • Phishing Exposed

    ¼öÀÔ
    Phishing Exposed [ Paperback ]
    James, Lance / Jevans, Dave | Syngress Publishing | 2005³â 07¿ù
    83,440¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,180¿ø
    Unveils the techniques phishers employ that enable them to commit fraudulent acts against the global financial industry. This work also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. It provides a view from both sides of the playing field, and ...
  • Configuring Vmware Esx Server 2.5

    ¼öÀÔ
    Muller, Al / Wilson, Seburn | Syngress Publishing | 2005³â 06¿ù
    83,440¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,180¿ø
  • Securing Im and P2P Applications for the Enterprise

    ¼öÀÔ
    Piccard, Paul / Sachs, Marcus / Baskin, Brian | Syngress Publishing | 2005³â 07¿ù
    83,440¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,180¿ø
    Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P ap...
  • Infosec Career Hacking: Sell Your Skillz, Not Your Soul

    ¼öÀÔ
    Infosec Career Hacking: Sell Your Skillz, Not Your Soul Sell Your Skillz, Not Your Soul [ Paperback ]
    Hurley, Chris / Long, Johnny / Bayles, Aaron W. | Syngress Publishing | 2005³â 06¿ù
    68,260¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,420¿ø
    Describes different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. This book also explains how the reader can build his own test laboratory to further enhance his existing skills ...
  • Cisco PIX Firewalls

    ¼öÀÔ
    Cisco PIX Firewalls Configure, manage, & Troubleshoot [ Paperback ]
    Khan | Syngress Publishing | 2005³â 04¿ù
    83,440¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,180¿ø
    The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS12