ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Blockchain for 6G-Enabled Network-Based Applications

    ¼öÀÔ
    Blockchain for 6G-Enabled Network-Based Applications A Vision, Architectural Elements, and Future Directions [ Paperback, 1st Edition ]
    Vinay Rishiwal,Sudeep Tanwar,Rashmi Chaudhr | CRC Press | 2024³â 10¿ù
    106,110¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,310¿ø
    This book provides a comprehensive overview of Blockchain for 6G enabled network-based applications. Following the key services of Blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges and various case studies of different 6G based applications.
  • Blockchain and IoT Integration

    ¼öÀÔ
    Blockchain and IoT Integration Approaches and Applications [ Paperback, 1st Edition ]
    Kavita Sain | Auerbach Publications | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by ¡°smart¡± machines. This book explores the platforms and applications of blockchain-enabled IoT.
  • Bitcoin and Blockchain

    Bitcoin and Blockchain History and Current Applications [ Paperback, 1st Edition ]
    Sandeep Kumar Panda,Ahmed A. Elngar,Valentina Emilia Balas,Mohammed Kaye | CRC Press | 2024³â 10¿ù
    92,080¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,610¿ø
    The Blockchain is growing fast, from the original bitcoin protocol to the second generation Ethereum platform and today in the process of building third generations Blockchains. We can see how technology evolved from the original form as a distributed database by becoming a fully fledged globally di...
  • Big Data Analytics in Fog-Enabled IoT Networks

    ¼öÀÔ
    Big Data Analytics in Fog-Enabled IoT Networks Towards a Privacy and Security Perspective [ Paperback, 1st Edition ]
    Govind P. Gupta,Rakesh Tripathi,Brij B. Gupta,Kwok Tai Chu | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled ...
  • Authorization and Access Control

    ¼öÀÔ
    Authorization and Access Control Foundations, Frameworks, and Applications [ Paperback, 1st Edition ]
    Parikshit N. Mahalle,Shashikant S. Bhong,Gitanjali R. Shind | CRC Press | 2024³â 10¿ù
    40,020¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,010¿ø
    This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 framework along with User managed access and security analysis. Detailed protocol overview and authorization process along with security analysis is dis...
  • Augmented Intelligence Toward Smart Vehicular Applications

    ¼öÀÔ
    Nishu Gupta,Joel Rodrigues,Justin Dauwel | CRC Press | 2024³â 10¿ù
    92,080¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,610¿ø
    The text discusses the role of artificial intelligence, human-computer interaction, big data analytics, augmented intelligence and edge computing in intelligent transportation systems.
  • Auditing Information and Cyber Security Governance

    Auditing Information and Cyber Security Governance A Controls-Based Approach [ Paperback, 1st Edition ]
    Robert E. Davi | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines.
  • Assistive Technology Intervention in Healthcare

    ¼öÀÔ
    Shruti Jain,Sudip Pau | CRC Press | 2024³â 10¿ù
    92,080¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,610¿ø
    Assistive Technology Intervention in Healthcare focuses on various applications of intelligent techniques in biomedical engineering and health informatics.
  • Art of Algorithm Design

    ¼öÀÔ
    Art of Algorithm Design [ Paperback, 1st Edition ]
    Sachi Nandan Mohanty,Pabitra Kumar Tripathy,Suneeta Satpath | Chapman and Hall/CRC | 2024³â 10¿ù
    114,120¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,710¿ø
    The Art of Algorithm design is a complementary perception of all books on Algorithm design and is a roadmap for all levels of learners as well as professionals dealing with algorithmic problems. It cover the topic in considerable depth, yet makes their design and analysis accessible to all levels of...
  • Artificial Intelligence and Data Mining for Mergers and Acquisitions

    ¼öÀÔ
    Debasis Chand | Chapman and Hall/CRC | 2024³â 10¿ù
    98,100¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,910¿ø
    The book proposal presents a modeling framework for Virtual Enterprise focused on process composition by consolidating individual process models into consolidated process model. This framework uses Artificial Intelligence Knowledge Bases and also proposes a Data Mining model using a fuzzy mathematic...
  • Applied Learning Algorithms for Intelligent IoT

    ¼öÀÔ
    Pethuru Raj Chelliah,Usha Sakthivel,Susila Nagaraja | Auerbach Publications | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    Connectivity through the Internet of Things (IoT) processes and platforms combined with AI create the foundation of developing smart systems exhibiting intelligent behavior. The book illustrates promising and potential machine learning (ML) and deep learning (DL) algorithms through real-world and re...
  • AI and Deep Learning in Biometric Security

    AI and Deep Learning in Biometric Security Trends, Potential, and Challenges [ Paperback, 1st Edition ]
    Gaurav Jaswal,Vivek Kanhangad,Raghavendra Ramachandr | CRC Press | 2024³â 10¿ù
    106,110¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,310¿ø
    This book focuses on artificial intelligence and deep learning approaches, with case studies to solve problems associated with biometric security such as authentication, spoofing attack detection, and object detection.
  • Agile Enterprise Risk Management

    Agile Enterprise Risk Management Risk-Based Thinking, Multi-Disciplinary Management and Digital Transformation [ Paperback, 1st Edition ]
    Howard M. Wiene | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    Managing risks while transforming a company to enable continuous adaptation are substantial, and AERM practices are an evolutionary step away from traditional Risk Assessment, Risk Management and Risk Assurance. Agile Enterprise Risk Management provides guidance as to how to achieve accelerated RM w...
  • Agile Audit Transformation and Beyond

    Agile Audit Transformation and Beyond [ Paperback, 1st Edition ]
    Toby DeRoch | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    Auditing at the speed of risk requires internal auditors to rethink the way we work. Agile auditing provides a path forward that blends the best elements from agile project management and internal audit best practices.
  • Advancing Computational Intelligence Techniques for Security Systems Design

    Uzzal Sharma,Parmanand Astya,Anupam Baliyan,Salah-ddine Krit,Vishal Jain,Mohammad Zubair Kha | CRC Press | 2024³â 10¿ù
    92,080¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,610¿ø
    Security systems have become an integral part of the building and large complex setups and intervention of Computational Intelligence (CI) paradigm plays an important role in security system architecture. The book covers both theoretical contributions and practical applications in security system de...
  • Advances in SIoT (Social Internet of Things)

    Advances in SIoT (Social Internet of Things) [ Paperback, 1st Edition, Illustrations, Color ]
    Gururaj H L,Pramod H B,Gowtham | CRC Press | 2024³â 10¿ù
    116,110¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,810¿ø
    This edited book is a descriptive summary of challenges, methods using in Social IoT with various case studies with diverse authors across globe. This special issue is soliciting scientific research papers that can present a snapshot of the latest research status of SIoT.
  • Advances in Cyber Security and Intelligent Analytics

    ¼öÀÔ
    Abhishek Verma,Jitendra Kumar,Hari Mohan Gaur,Vrijendra Singh,Valentina Emilia Bala | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learni...
  • Advanced Circuits and Systems for Healthcare and Security Applications

    ¼öÀÔ
    Balwinder Raj,Brij B. Gupta,Jeetendra Sing | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    This book provides broader coverage of the basic aspects of advanced circuits and security, and introduce the corresponding principles. By the end of this book, you will be familiarized with the theoretical frameworks, technical methodologies, and empirical research findings in the field.
  • 5G New Radio Non-Orthogonal Multiple Access

    ¼öÀÔ
    5G New Radio Non-Orthogonal Multiple Access [ Paperback, 1st Edition ]
    Yifei Yuan,Zhifeng Yua | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    This book provides detailed descriptions of downlink non-orthogonal multiple transmissions and uplink non-orthogonal multiple access (NOMA) from the aspects of majorly used 5G New Radio scenarios and system performance.
  • 5G Cyber Risks and Mitigation

    ¼öÀÔ
    5G Cyber Risks and Mitigation [ Paperback, 1st Edition ]
    Sabhyata Son | CRC Press | 2024³â 10¿ù
    90,090¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,510¿ø
    5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS4