ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • VMware Cookbook: A Real-World Guide to Effective VMware Use

    ¼öÀÔ
    Troy, Ryan / Helmke, Matthew | O'Reilly Media | 2012³â 06¿ù
    61,320¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,070¿ø
    If you want to gain insight into the real-world uses of VMware ESXi, this cookbook provides scores of step-by-step solutions for working with this product in a wide range of network environments.
  • Windows Networking Tools

    ¼öÀÔ
    Windows Networking Tools The Complete Guide to Management, Troubleshooting, and Security [ Paperback ]
    Held, Gilbert | Auerbach Publications | 2012³â 11¿ù
    110,110¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,510¿ø
    This book discusses how built-in and third-party networking tools can be used to diagnose network problems and performance issues as well as enhance the security of computer systems. The author covers a variety of networking tools and demonstrates how they can be used to determine ahead of time whet...
  • General Aviation Security

    ¼öÀÔ
    General Aviation Security Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Benny, Ph. D. Daniel J. | CRC Press | 2012³â 08¿ù
    270,330¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,520¿ø
    Award-winning and critically acclaimed historian Helen Rappaport turns to the tragic story of the daughters of the last Tsar of all the Russias, slaughtered with their parents at Ekaterinburg.
  • SC-FDMA for Mobile Communications

    ¼öÀÔ
    Dessouky, Moawad I. | CRC Press | 2013³â 07¿ù
    280,350¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 14,020¿ø
    This book examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Exploring the emerging trend of cooperative communication and how it can improve the physical layer security, it considers the design of distributed coding schemes and protocols for wireless relay networks where users co...
  • Supply Chain Security

    ¼öÀÔ
    Supply Chain Security A Comprehensive Approach [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Arway, Arthur G. | CRC Press | 2013³â 03¿ù
    270,330¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 13,520¿ø
    Discover why 100,000+ teachers look to this ground-breaking text to put differentiated instruction immediately into practice. New edition includes new strategies and a Common Core lesson-planning template.
  • Cloud Enterprise Architecture

    ¼öÀÔ
    Cloud Enterprise Architecture [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Raj, Pethuru | Auerbach Publications | 2012³â 10¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    Packed with hundreds of real-life examples, this book covers areas of English usage that typically cause researchers difficulty. It focuses on specific errors that repeatedly appear in papers written by non-native authors, making it an ideal study guide.
  • Network Information Theory

    ¼öÀÔ
    El Gamal, Abbas / Kim, Young-Han | Cambridge University Press | 2012³â 01¿ù
    173,560¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,680¿ø
    This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point infor...
  • Corporate Security in the Asia-Pacific Region

    ¼öÀÔ
    Corporate Security in the Asia-Pacific Region Crisis, Crime, Fraud, and Misconduct [ Hardcover ]
    Brooks PhD, David J. | CRC Press | 2012³â 08¿ù
    166,180¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,310¿ø
    As corporations and governments become more litigious and risk averse, international risk management becomes more complex. This book examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, op...
  • Your Unix/Linux: The Ultimate Guide

    ¼öÀÔ
    Your Unix/Linux: The Ultimate Guide The Ultimate Guide [ Hardcover ]
    Das, Sumitabha | McGraw-Hill College | 2012³â 01¿ù
    246,130¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,310¿ø
    Suitable for both users and programmers, this UNIX/Linux text features a pedagogical framework that allows beginning students to gain a grasp of fundamental concepts. It also features chapters on advanced topics that inspire experienced reader to move beyond the basics.
  • Wireless Body Area Networks

    ¼öÀÔ
    Wireless Body Area Networks Technology, Implementation, and Applications [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Yuce, Mehmet R. / Khan, Jamil | Jenny Stanford Publishing | 2011³â 12¿ù
    230,280¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,520¿ø
    With contributions from experts, this book explores the latest WBAN systems, technologies, and applications. It covers the basic techniques for designing and building WBAN systems. It explains the deployment issues and then moves into the application areas. The remaining chapters focus on the devel...
  • Information Services Design

    Information Services Design A Design Science Approach for Sustainable Knowledge [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Wijnhoven, Fons | Routledge | 2011³â 12¿ù
    290,350¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 14,520¿ø
    This book provides fundamental notions of information and its consequences for information service success, business models and processes, and architecture and exploitation. These topics are essential for modern curricula of management, communication science and information systems, and for anyone i...
  • Who Controls the Internet?: Illusions of a Borderless World

    ¼öÀÔ
    Who Controls the Internet?: Illusions of a Borderless World Illusions of a Borderless World [ Paperback ]
    Goldsmith, Jack / Wu, Tim | Oxford University Press, USA | 2008³â 06¿ù
    28,390¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,420¿ø
    A critical look at the history and future of the Internet.
  • The Bastard of Istanbul

    ¼öÀÔ
    The Bastard of Istanbul [ Paperback ]
    Shafak, Elif | Penguin Books | 2008³â 01¿ù
    25,890¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,300¿ø
    In her second novel written in English, one of Turkeys most acclaimed and outspoken writers confronts her countrys violent past, in a vivid and colorful tale about the tangled histories of two families.
  • Managing Global Supply Chains

    ¼öÀÔ
    Managing Global Supply Chains Compliance, Security, and Dealing with Terrorism [ Hardcover ]
    Cook, Thomas A. | Auerbach Publications | 2008³â 02¿ù
    220,270¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,020¿ø
    Outlines a strategy for supply chain executives in the post 9/11 world. This resource delineates problems and changes in rules and regulations; discusses vocabulary and acronyms, including AES, CSI, 24-Hour Manifest Rule, USPPI, ACE, and The Patriot Act; and, teaches executives to implement mandator...
  • Mechanics of User Identification and Authentication

    ¼öÀÔ
    Mechanics of User Identification and Authentication Fundamentals of Identity Management [ Hardcover ]
    Todorov, Dobromir | Auerbach Publications | 2007³â 06¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    User identification and authentication are essential to modern security. This book presents the general philosophy of user authentication and access control. It introduces key concepts and outlines the process of controlled access to resources through authentication, authorization, and accounting.
  • The Old New Thing: Practical Development Throughout the Evolution of Windows

    ¼öÀÔ
    The Old New Thing: Practical Development Throughout the Evolution of Windows Practical Development Throughout the Evolution of Windows [ Paperback ]
    Chen, Raymond | Pearson Education (US) | 2006³â 12¿ù
    61,320¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,070¿ø
    Why does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"?Many of Windows' quirks have perfectly logical expl...
  • Digital Privacy

    ¼öÀÔ
    Digital Privacy Theory, Technologies, and Practices [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Acquisti, Alessandro / Gritzalis, Stefanos / Lambrinoudakis, Costos | Auerbach Publications | 2007³â 09¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    Privacy as a fundamental human right must be protected. This book addresses the issue and provides information on technologies, best practices, and research results, as well as legal, regulatory, and ethical issues.
  • Data Mining Methods and Applications

    ¼öÀÔ
    Klimberg, Ronald K.(EDT) | Auerbach Publications | 2007³â 12¿ù
    200,250¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 10,020¿ø
    Addressing a variety of organizational issues, this book presents a compilation of research works on data mining and forecasting techniques, including multivariate, evolutionary, and neural net methods. It focuses on data mining techniques used for conducting marketing research.
  • IT Security Governance Guidebook with Security Program Metrics on CD-ROM

    ¼öÀÔ The CISO Toolkit
    Cohen, Fred | Auerbach Publications | 2007³â 01¿ù
    240,300¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,020¿ø
    Offers explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as explanations of specific iss...
  • CISO Leadership

    ¼öÀÔ (ISC)2 Press
    CISO Leadership Essential Principles for Success [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Fitzgerald, Todd / Krause, Micki | Auerbach Publications | 2007³â 12¿ù
    160,170¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,010¿ø
    Delineates information needed and includes from-the-trenches advice on how to have a successful career in the field of CISO leadership.
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS11