ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Inside Cyber Warfare: Mapping the Cyber Underworld

    ¼öÀÔ
    Inside Cyber Warfare: Mapping the Cyber Underworld Mapping the Cyber Underworld [ Paperback ]
    Carr, Jeffrey | O'Reilly Media | 2011³â 12¿ù
    61,320¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,070¿ø
    When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare?without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals thr...
  • Microsoft Office and Beyond: Computer Concepts and Applications [With DVD]

    ¼öÀÔ
    Microsoft Office and Beyond: Computer Concepts and Applications [With DVD] Computer Concepts and Applications [ Paperback ]
    Richardson, Theodor / Thies, Charles | Mercury Learning and Information | 2011³â 08¿ù
    108,980¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,450¿ø
    The focus of this text is to provide new students and those with some experience with the skills needed to proficiently discuss essential computer concepts, navigate and conduct basic tasks using an operating system, and develop files using basic productivity applications.
  • Computability and Complexity Theory

    ¼öÀÔ
    Homer, Steven / Selman, Alan L. | Springer | 2011³â 12¿ù
    164,560¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,230¿ø
    This book surveys theoretical computer science, presenting fundamental concepts and results. Updated and revised, the new edition includes two new chapters on nonuniform complexity, circuit complexity and parallel complexity, and randomized complexity.
  • Newton Methods for Nonlinear Problems: Affine Invariance and Adaptive Algorithms

    ¼öÀÔ
    Newton Methods for Nonlinear Problems: Affine Invariance and Adaptive Algorithms Affine Invariance and Adaptive Algorithms [ Paperback ]
    Deuflhard, Peter | Springer | 2011³â 09¿ù
    134,640¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,740¿ø
  • Google+ for Dummies

    ¼öÀÔ
    Google+ for Dummies Portable Edition [ Paperback ]
    Stay, Jesse | John Wiley & Sons | 2011³â 11¿ù
    10,880¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 550¿ø
    A new social network! Here's your user's guide to Google+Google+ is Google's new social network and from day one it has had the social media world abuzz with excitement. Early fans claim it's easier to use than Facebook and Twitter and has a wealth of creative new features. If you want to learn how ...
  • Cyber Security and Critical National Infrastructure: Chatham House Report

    ¼öÀÔ
    Cornish, Paul / Livingstone, David / Yorke, Claire | Chatham House (Formerly Riia) | 2011³â 09¿ù
    22,430¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,130¿ø
  • Peer-To-Peer Data Management

    ¼öÀÔ
    Peer-To-Peer Data Management [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Aberer, Karl | Morgan & Claypool | 2011³â 09¿ù
    63,170¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,900¿ø
    This lecture introduces systematically into the problem of managing large data collections in peer-to-peer systems. Search over large datasets has always been a key problem in peer-to-peer systems and the peer-to-peer paradigm has incited novel directions in the field of data management. This result...
  • Probabilistic Databases

    ¼öÀÔ
    Probabilistic Databases [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Suciu, Dan / Olteanu, Dan / Re, Christopher / Koch, Christoph | Morgan & Claypool | 2011³â 12¿ù
    71,060¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,140¿ø
    Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial ...
  • Wireless Reconnaissance in Penetration Testing

    ¼öÀÔ
    Neely, Matthew / Hamerstone, Alex / Sanyk, Chris | Syngress Publishing | 2012³â 01¿ù
    68,090¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,410¿ø
    Describes the ways that a penetration tester can gather and apply the information available from radio traffic. This book includes information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to case studies describing how this informa...
  • Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7

    ¼öÀÔ
    Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 Advanced Analysis Techniques for Windows 7 [ Paperback ]
    Carvey, Harlan A. | Syngress Publishing | 2012³â 01¿ù
    95,350¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,770¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ

    Ç°Àý

    ¸®½ºÆ®¿¡ ³Ö±â
  • R for SAS and SPSS Users

    ¼öÀÔ
    R for SAS and SPSS Users [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Muenchen, Robert A. | Springer | 2011³â 07¿ù
    284,260¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,530¿ø
    This book introduces R using SAS and SPSS terms with which you are already familiar. The programs and practice datasets are available for download.The glossary defines over 50 R terms using SAS/SPSS jargon and again using R jargon.
  • The Panasonic Lumix DMC-Gh2: The Unofficial Quintessential Guide

    ¼öÀÔ
    The Panasonic Lumix DMC-Gh2: The Unofficial Quintessential Guide The Unofficial Quintessential Guide [ Paperback ]
    Matsumoto Ph. D., Brian / Roullard, Carol F. | Rocky Nook | 2012³â 01¿ù
    40,820¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,050¿ø
  • Android Security: Attacks and Defenses

    ¼öÀÔ
    Android Security: Attacks and Defenses Attacks and Defenses [ Hardcover, 1 Edition, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Misra, Anmol / Dubey, Abhishek | Auerbach Publications | 2013³â 04¿ù
    112,140¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,610¿ø
    Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics...
  • Principles of System Identification

    ¼öÀÔ
    Principles of System Identification Theory and Practice [ Hardcover ]
    Tangirala, Arun K. (Indian Institute of Technology, Madras, India) | CRC Press | 2014³â 12¿ù
    230,280¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,520¿ø
    A lift-the-flap information book that introduces readers to the science of weather. It is filled with facts from how hurricanes and floods happen to how global warming is affecting the Earth's climates.
  • Buttonless

    ¼öÀÔ
    Buttonless Incredible iPhone and iPad Games and the Stories Behind Them [ Paperback ]
    Rigney, Ryan | Taylor & Francis Inc | 2011³â 12¿ù
    65,580¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 3,280¿ø
    This book presents some of the most interesting iPhone and iPad games, along with stories of the people behind these games. It describes hundreds of titles, including well-known games and hidden games, and provides insight into the development of games for the iOS platform.
  • Hardware Security: Design, Threats, and Safeguards

    ¼öÀÔ
    Hardware Security: Design, Threats, and Safeguards Design, Threats, and Safeguards [ Hardcover, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Mukhopadhyay, Debdeep / Chakraborty, Rajat Subhra | CRC Press | 2014³â 10¿ù
    254,350¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 12,720¿ø
    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms.
  • Repackaging Libraries for Survival

    ¼öÀÔ
    Repackaging Libraries for Survival Climbing Out of the Box [ Hardcover ]
    Lee, Sul H. (University of Oklahoma Libraries, Norman, OK, USA)(EDT) | Routledge | 2011³â 11¿ù
    174,190¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 8,710¿ø
    Academic libraries are being called to re-envision their traditional roles to provide for today¡¯s scholars while anticipating the needs of tomorrow. This publication gives examples of how libraries are successfully repackaging themselves to meet these needs, providing important insights into how th...
  • Social Media Intelligence

    ¼öÀÔ
    Social Media Intelligence Extracting Knowledge from the Fire Hose of Conversations [ Paperback ]
    Falkow, Sally | Pearson P T R | 2013³â 03¿ù
    34,060¿ø (18% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,710¿ø
  • Software Life Cycle Management Standards

    ¼öÀÔ
    Software Life Cycle Management Standards Real-world Scenarios and Solutions for Savings [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    It Governance / Wright, David | Itgp | 2011³â 07¿ù
    47,300¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,420¿ø
    Those involved in software management, from the publisher/OEM and third-party reseller through to the enterprise software consumer, will benefit from the insights presented here. Software developers and publishers can improve their processes, leading to financial savings and far greater customer sat...
  • Graph Algorithms

    ¼öÀÔ
    Graph Algorithms [ Paperback, POD ÁÖ¹®Á¦ÀÛµµ¼­ ]
    Even, Shimon / Even, Guy (Tel-Aviv University)(EDT) | Cambridge University Press | 2011³â 10¿ù
    63,150¿ø (5% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 1,900¿ø
    Shimon Even's Graph Algorithms, published in 1979, was a seminal introductory book on algorithms read by everyone engaged in the field. This thoroughly revised second edition, with a foreword by Richard M. Karp and notes by Andrew V. Goldberg, continues the exceptional presentation from the first ed...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS12