ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Advances in Elliptic Curve Cryptography

    Advances in Elliptic Curve Cryptography [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Blake, Ian F. / Seroussi, Gadiel / Smart, Nigel P. | Cambridge University Press | 2005³â 06¿ù
    134,220¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided artic...
  • TCP/IP Essentials

    TCP/IP Essentials A Lab-Based Approach [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Li, Yihan (Polytechnic University, New York) | Cambridge University Press | 2004³â 12¿ù
    134,220¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    The TCP/IP family of protocols has become the de facto standard in the world of networking. Found in virtually all computer communication systems, they form the basis of today's Internet. Including a series of carefully designed laboratory experiments that span the various elements of protocol defin...
  • Defending the Digital Frontier: Practical Security for Management

    ¼öÀÔ
    Defending the Digital Frontier: Practical Security for Management Practical Security for Management [ Hardcover ]
    Ernst & Young Llp / Babiak, Jan / Butters, John | Wiley | 2004³â 11¿ù
    40,820¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,050¿ø
    Enhance the digital security knowledge--base within any organization In todaya s competitive business environment, information and information technology have become crucial for a companya s success. Ensuring the confidentiality of such information--financial, trade secrets, and the like--has bec...
  • Computer Networking: Internet Protocols in Action

    ¼öÀÔ
    Computer Networking: Internet Protocols in Action Internet Protocols In Action [ Paperback ]
    Matthews, Jeanna | John Wiley & Sons | 2005³â 01¿ù
    83,150¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,160¿ø
    Helps readers make the connection between the concepts of network analysis and real world applications. Focusing on protocols, this paperback manual offers a flexible presentation that allows it to be used with bottom up and top down approaches.
  • Adaptive Information: Improving Business Through Semantic Interoperability, Grid Computing, and Enterprise Integration

    ¼öÀÔ
    Adaptive Information: Improving Business Through Semantic Interoperability, Grid Computing, and Enterprise Integration Improving Business Through Semantic Interoperability, Grid Computing, And Enterprise Integration [ Hardcover ]
    Pollock, Jeffrey T. / Hodgson, Ralph | Wiley-Interscience | 2004³â 09¿ù
    196,300¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 9,820¿ø
    Adaptive information refers to when one system is made capable of using parts of another system in a meaningful way without requiring the systems to become tightly coupled.
  • Optical Networking Best Practices Handbook

    Vacca, John R. | Wiley-Interscience | 2006³â 12¿ù
    ±¸¸ÅÇýÅÃ
    ±³Àç ±ÕÀÏ°¡ µµ¼­
    10,000¿ø (77% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 0¿ø
    Optical Networking Best Practices Handbook presents optical networking in a very comprehensive way for non-engineers needing to understand the fundamentals of fiber, high-capacity and high-speed equipment and networks, and upcoming carrier services. The book provides a practical understanding of fib...
  • Principles of Information Systems Security

    ¼öÀÔ
    Principles of Information Systems Security Text and Cases [ Hardcover ]
    Dhillon, Gurpreet | John Wiley & Sons Inc | 2006³â 03¿ù
    263,310¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,170¿ø
  • An Introduction to Communication Network Analysis

    ¼öÀÔ
    Kesidis, George | Wiley-IEEE Press | 2007³â 07¿ù
    147,150¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 7,360¿ø
    Introduction to Modeling and Performance Evaluation of Communication Networks is a quantitative text that focuses on the real issues behind serious modeling and analysis of communications networks. The author covers all the necessary mathematics and theory in order for students to understand the too...
  • Fundamentals Of Digital Image Watermarking

    ¼öÀÔ
    Perez-Gonzalez , Fernando / Voloshynovskiy, Sviatoslav | John Wiley & Sons Inc | 2005³â 08¿ù
    149,950¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 7,500¿ø
    A digital watermark is information embedded into an image (still or video) and imperceptible to the naked eye. The watermark hides in the naturally occurring variations throughout the image and acts as a copyright communication device, travelling with the content, without the requirement of an exter...
  • Analytical Network and System Administration

    ¼öÀÔ
    Analytical Network and System Administration Managing Human-Computer Networks [ Hardcover ]
    Burgess, Mark (Oslo University College, Norway) | John Wiley & Sons Inc | 2004³â 05¿ù
    204,480¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,230¿ø
    Network and system administration usually refers to the skill of keeping computers and networks running properly. But in truth, the skill needed is that of managing complexity. This book describes the science behind these complex systems, independent of the actual operating systems they work on.
  • Protocols and Architectures for Wireless Sensor Networks

    Karl, Holger / Willig, Andreas | Wiley | 2005³â 06¿ù
    55,000¿ø Æ÷ÀÎÆ®Àû¸³ 1,100¿ø
    Karl (University of Paderborn, Germany) and Willig (Hasso-Plattner- Institute, University of Potsdam, Germany) examine issues related to wireless sensor networks. They cover architectures and communications protocols in detail, illustrating solutions with practical examples and case studies, and exp...
  • Topology Control in Wireless Ad Hoc and Sensor Networks

    ¼öÀÔ
    Santi, Paolo | Wiley | 2005³â 09¿ù
    189,480¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 9,480¿ø
    Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ...
  • Beyond Voip Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony

    Beyond Voip Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony Understanding Voice Technology And Networking Techniques For IP Telephony [ Hardcover ]
    Hersent, Olivier / Petit, Jean-Pierre / Gurle, David | Wiley | 2005³â 03¿ù
    114,000¿ø Æ÷ÀÎÆ®Àû¸³ 2,280¿ø
    Aimed at those responsible for creating effective, revenue-generating multimedia services, this companion volume to IP Telephony: Deploying Voice-over-IP Protocols identifies issues that arise in the deployment stage of implementing a VoIP network. It begins with an introduction to the basics of spe...

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Symbian Os Explained

    Symbian Os Explained Effective C++ Programming For Smartphones [ Paperback ]
    Jo Stichbury | John Wiley & Sons | 2004³â 12¿ù
    39,000¿ø Æ÷ÀÎÆ®Àû¸³ 780¿ø
    This book covers the fundamental aspects of C++ on Symbian OS, using simple and straightforward explanations to help you write effective code for Symbian OS smartphones.Key technologies covered include: * client-server architecture * descriptors and dynamic containers * active objects, threads and p...
  • Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence

    ¼öÀÔ
    Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence Technologies for Building Business Intelligence and Consumer Confidence [ Hardcover ]
    Chang, Elizabeth / Hussain, Farookh / Dillon, Tharam | Wiley | 2006³â 06¿ù
    211,230¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,570¿ø
    This dynamic text is both a tutorial and reference guide to e-trust in relation to electronic business, e-services, e-applications and e-trusted communications, and explains how trust and reputation are related to e-business, security and risk management.
  • AAA and Network Security for Mobile Access: Radius, Diameter, Eap, Pki and IP Mobility

    AAA and Network Security for Mobile Access: Radius, Diameter, Eap, Pki and IP Mobility Radius, Diameter, EAP, PKI and IP Mobility [ Hardcover ]
    Nakhjiri, Madjid / Nakhjiri, Mahsa | Wiley | 2005³â 09¿ù
    ±¸¸ÅÇýÅÃ
    Ưº°ÇÒÀεµ¼­
    10,000¿ø (83% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 500¿ø
    The problem of providing secure network access for remote mobile users is becoming more and more complicated. Therefore the IETF have developed several standards (RADIUS, DIAMETER) to systematize the security mechanisms.

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • Systems and Human Science - For Safety, Security and Dependability: Selected Papers of the 1st International Symposium Ssr 2003, Osaka, Japan, Novembe

    ¼öÀÔ
    Systems and Human Science - For Safety, Security and Dependability: Selected Papers of the 1st International Symposium Ssr 2003, Osaka, Japan, Novembe For Safety, Security And Dependability; Selected Papers of the 1st International Symposium SSR2003, Osaka, Japan, November 2003 [ Hardcover ]
    Yamamoto, Shigeru / Makino, Kazuhisa / Arai, Tatsuo | Elsevier Science | 2005³â 03¿ù
    389,020¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 19,460¿ø
    Our society keeps growing with a large number of complicated machines and systems, while we are spending our diverse lives. It is more likely than ever that we are involved in dangers, accidents, crimes, and disasters. This book offers an evaluation of systems in the aspects of sense of security and...
  • Defense Mechanisms: Theoretical, Research and Clinical Perspectives Volume 136

    ¼öÀÔ
    Defense Mechanisms: Theoretical, Research and Clinical Perspectives Volume 136 Theoretical, Research And Clinical Perspectives #136 [ Hardcover ]
    Hentschel, Uwe / Smith, Gudmund / Draguns, Juris G. | North-Holland | 2004³â 06¿ù
    204,980¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,250¿ø
    Focuses on defense mechanisms as theoretical constructs and the possibilities of their empirical registration by different methods, and the application of these constructs in different fields of psychology with special regard to concurrent and predictive validity. This book explains the theoretical ...
  • Somewhat on the Community System

    Somewhat on the Community System Representations of Fourierism in the Works of Nathaniel Hawthorne [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Loman, Andrew | Routledge | 2005³â 10¿ù
    270,330¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,520¿ø
    Undertakes a comprehensive linguistic and historical study of the plain style tradition in poetry, its relationship with so-called 'difficult' poetry, and its particular realization in the cultural and historical context of 20th-century Britain. The author examines the nature of poetry as a type of ...
  • Singing Contest

    Singing Contest Conventions of Sound in the Poetry of Seamus Heaney [ Hardcover ]
    Tyler, Meg | Routledge | 2005³â 08¿ù
    270,330¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,520¿ø
    Incorporating readings of Heaney's elegies, pastoral eclogues and sonnets, this book presents a formal analysis which comprises close readings of Seamus Heaney's poetry. By a detailed structural analysis of diction, meter, imagery and generic form, it considers the interplay between different kinds ...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
ATOM