ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Design of Network Coding Schemes in Wireless Networks

    ¼öÀÔ
    Zihuai Li | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    This book provides a consolidated view of the various network coding techniques to be implemented at the design of the wireless networks for improving its overall performance. It covers multiple sources communicating with multiple destinations via a common relay followed by network coded modulation ...
  • Designing Secure Systems

    ¼öÀÔ
    Designing Secure Systems [ Paperback, 1st Edition ]
    Michael Melon | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture.
  • Deep Learning for Internet of Things Infrastructure

    ¼öÀÔ
    Uttam Ghosh,Mamoun Alazab,Ali Kashif Bashir,Al-Sakib Khan Patha | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of deep learning (DL)-based data analytics of IoT (Internet of Things) infrastructures.
  • Deep Learning for Biomedical Applications

    Deep Learning for Biomedical Applications [ Paperback, 1st Edition ]
    Utku Kose,Omer Deperlioglu,D. Jude Hemant | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    This book is a detailed reference on biomedical applications using Deep Learning. Because Deep Learning is an important actor shaping the future of Artificial Intelligence, its specific and innovative solutions for both medical and biomedical are very critical. This book starts with essentials and m...
  • Debates Shaping Spectrum Policy

    ¼öÀÔ
    Debates Shaping Spectrum Policy [ Paperback, 1st Edition ]
    Martin Sim | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    What debates have caused spectrum policy to change course, and which will determine its future direction? This book examines these issues through a series of essays from a range of notable experts.
  • Data Protection and Privacy in Healthcare

    ¼öÀÔ
    Data Protection and Privacy in Healthcare Research and Innovations [ Paperback, 1st Edition ]
    Ahmed Elngar,Ambika Pawar,Prathamesh Chur | CRC Press | 2024³â 10¿ù
    106,700¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,340¿ø
    Healthcare management has rapidly changed over the last few years from disease centered to patient centered. The analysis of healthcare data plays an important role in healthcare management, but the privacy of patient¡¯s records must be of equal concern. This book covers the privacy issues and data...
  • Data-Driven Blockchain Ecosystem

    ¼öÀÔ
    Data-Driven Blockchain Ecosystem Fundamentals, Applications, and Emerging Technologies [ Paperback, 1st Edition ]
    Alex Khang,Subrata Chowdhury,Seema Sharm | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    This book focuses on the futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools with the models of the data-driven blockchain ecosystem.
  • Cyber-Security Threats, Actors, and Dynamic Mitigation

    ¼öÀÔ
    Nicholas Kolokotronis,Stavros Shiaele | CRC Press | 2024³â 10¿ù
    94,620¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,740¿ø
    Cyber-security and its related threats change constantly. The book aims at using practical contemporary machine learning-based techniques for detecting everyday threats such as, malware and dynamic risk analysis on attack graphs to determine how vulnerable the system is and what security measures ar...
  • Cybersecurity Public Policy

    ¼öÀÔ
    Cybersecurity Public Policy SWOT Analysis Conducted on 43 Countries [ Paperback, 1st Edition ]
    Bradley Fowler,Kennedy Marang | CRC Press | 2024³â 10¿ù
    118,790¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,940¿ø
    This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.
  • Cybersecurity Lessons from CoVID-19

    ¼öÀÔ
    Cybersecurity Lessons from CoVID-19 [ Paperback, 1st Edition ]
    Robert Slad | CRC Press | 2024³â 10¿ù
    40,240¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,020¿ø
    Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and structured by the domains of information security, this book looks at what the crisis teaches us about security.
  • Cybersecurity Issues in Emerging Technologies

    ¼öÀÔ
    Leandros Maglaras,Ioanna Kantzavelo | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.
  • Cyber Security Applications for Industry 4.0

    R Sujatha,G Prakash,Noor Zaman Jhanjh | Chapman and Hall/CRC | 2024³â 10¿ù
    110,730¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,540¿ø
    This book provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering. It is primarily aimed at industry professionals, academicians and researchers for better understanding of the secure data transition between the Industry 4.0 enable...
  • Cyber Security and Operations Management for Industry 4.0

    ¼öÀÔ
    Ahmed A Elngar,N. Thillaiarasu,Mohamed Elhoseny,K. Martin Sagaya | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    Covering cyber security and Industry 4.0 concepts from a management and operational level, this book connects the topics of Industry 4.0 and cyber security together seamlessly. It discusses both the risks and solutions of using cyber security techniques for Industry 4.0.
  • Cybersecurity

    Cybersecurity Ambient Technologies, IoT, and Industry 4.0 Implications [ Paperback, 1st Edition ]
    Gautam Kumar,Om Prakash Singh,Hemraj Sain | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn...
  • Cyber-Physical Systems

    Cyber-Physical Systems A Comprehensive Guide [ Paperback, 1st Edition ]
    Nonita Sharma,L K Awasthi,Monika Mangla,K P Sharma,Rohit Kuma | Chapman and Hall/CRC | 2024³â 10¿ù
    106,700¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,340¿ø
    The proposed book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. The primary audience of this book are undergraduates, graduates and researchers of computer science and IT. Engineers and IT professionals would also find it useful.
  • Cyber Crime Investigator's Field Guide

    ¼öÀÔ
    Cyber Crime Investigator's Field Guide [ Paperback, 3rd Edition ]
    Bruce Middleto | Auerbach Publications | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.
  • Customizable and Adaptive Quantum Processors

    ¼öÀÔ
    Customizable and Adaptive Quantum Processors Theory and Applications [ Paperback, 1st Edition ]
    Nadia Nedjah,Luiza De Macedo Mourell | CRC Press | 2024³â 10¿ù
    40,240¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,020¿ø
    The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
  • Cybercrime and Cybersecurity in the Global South

    ¼öÀÔ
    Cybercrime and Cybersecurity in the Global South Concepts, Strategies and Frameworks for Greater Resilience [ Paperback, 1st Edition ]
    Charlette Donalds,Corlane Barclay,Kweku-Muata Osei-Bryso | Routledge | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This book examines the trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, threats, and risks likely faced by businesses and governments of the region. It offers tools, techniques, and legislative frameworks that can improve the Glob...
  • Countering the Cloud

    Countering the Cloud Thinking With and Against Data Infrastructures [ Paperback, 1st Edition ]
    Luke Mun | Routledge | 2024³â 10¿ù
    40,240¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,020¿ø
    This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the logics of speed, efficiency, and resilience with communal and ecological ways of thinking and being, turning technical ¡°solutions¡± back into open questions about what society wants and wha...
  • Convergence of Internet of Things and Cloud for Smart Computing

    Parikshit N. Mahalle,Nancy Ambritta P.,Gitanjali Rahul Shinde,Arvind Vinayak Deshpand | CRC Press | 2024³â 10¿ù
    40,240¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 2,020¿ø
    This book explains real-time IoT application development activity with basic understanding of the IoT architecture, use cases, smart/cloud computing and associated challenges in design and development of the IoT system. All the technical details related to protocol stack, technologies and platforms ...
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS6