ÄÜÅÙÃ÷ ¹Ù·Î°¡±â
º»¹® ¹Ù·Î°¡±â

YES24 Ä«Å×°í¸® ¸®½ºÆ®

YES24 À¯Æ¿¸Þ´º

Global YES24¾È³»º¸±â

Global YES24´Â?

K-POP/K-Drama °ü·Ã»óÇ°(À½¹Ý,µµ¼­,DVD)À»
¿µ¹®/Áß¹® À¸·Î ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

Korean wave shopping mall, sell the
K-POP/K-Drama (CD,DVD,Blu-ray,Book) We aceept PayPal/UnionPay/Alipay
and support English/Chinese Language service

English

íÂ为õó售ïá规 K-POP/K-Drama ßÓ关(CD,图书,DVD) 韩×µßÂù¡îÜ网ó×, ò¨ò¥ ñéÙþ/çÈÙþ Ôõú­èâ结账Û°ãÒ

ñéÙþ

Exclusive ticket sales for domestic and international pop artists

Global yesticket

°Ë»ö

¾î±ú¹è³Ê

2¿ù ÇýÅà ¸ðÀ½
½´ÆÛƯ°¡
1/6

ºü¸¥ºÐ¾ßã±â


¿Ü±¹µµ¼­ Ä«Å×°í¸®¸®½ºÆ®

  • Advances in Cyber Security and Intelligent Analytics

    ¼öÀÔ
    Abhishek Verma,Jitendra Kumar,Hari Mohan Gaur,Vrijendra Singh,Valentina Emilia Bala | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learni...
  • Advanced Circuits and Systems for Healthcare and Security Applications

    ¼öÀÔ
    Balwinder Raj,Brij B. Gupta,Jeetendra Sing | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This book provides broader coverage of the basic aspects of advanced circuits and security, and introduce the corresponding principles. By the end of this book, you will be familiarized with the theoretical frameworks, technical methodologies, and empirical research findings in the field.
  • 5G New Radio Non-Orthogonal Multiple Access

    ¼öÀÔ
    5G New Radio Non-Orthogonal Multiple Access [ Paperback, 1st Edition ]
    Yifei Yuan,Zhifeng Yua | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    This book provides detailed descriptions of downlink non-orthogonal multiple transmissions and uplink non-orthogonal multiple access (NOMA) from the aspects of majorly used 5G New Radio scenarios and system performance.
  • 5G Cyber Risks and Mitigation

    ¼öÀÔ
    5G Cyber Risks and Mitigation [ Paperback, 1st Edition ]
    Sabhyata Son | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.
  • 5G and Next-Gen Consumer Banking Services

    ¼öÀÔ
    5G and Next-Gen Consumer Banking Services [ Paperback, 1st Edition ]
    Krunoslav Ris, Ph | CRC Press | 2024³â 10¿ù
    120,790¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,040¿ø
    This book covers:* Decentralization of the Banks* Banking without Banks* 5G will change Bank Industry* BlockChain adoption by the Banking industry* Modern Banking Industry
  • 5G and Beyond

    ¼öÀÔ
    5G and Beyond The Future of IoT [ Paperback, 1st Edition ]
    Parag Chatterjee,Robin Singh Bhadoria,Yadunath Patha | Chapman and Hall/CRC | 2024³â 10¿ù
    106,700¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,340¿ø
    Internet of Things (IoT) is one of the most trending topics in the tech-world. The proposed book is a one-stop solution with all topics of IoT-5G in one place with adequate technical details This book is aimed primarily at post graduate students and researchers working in the field of Internet of Th...
  • Street Computing

    ¼öÀÔ
    Street Computing Urban Informatics and City Interfaces [ Paperback, 1st Edition ]
    Marcus Foth,Markus Rittenbruch,Ricky Robinson,Stephen Ville | Routledge | 2024³â 10¿ù
    80,520¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Street Computing develops tools and techniques that will help urban residents help themselves. Metaphorically speaking, it is taking computing to the street by giving the general public ? rather than just researchers and professionals ? the power to leverage available city infrastructure and create ...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Policing Cybercrime

    ¼öÀÔ
    Policing Cybercrime Networked and Social Media Technologies and the Challenges for Policing [ Paperback, 1st Edition ]
    David S. Wall,Matthew William | Routledge | 2024³â 10¿ù
    80,520¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Cybercrime is now regarded as a major threat to society, yet common understandings of the change are developing slowly. This book explores the challenges to policing created by the increased professionalism of criminals and (separately) the new forms of deviance brought by social network media.This ...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Military Ethics and Emerging Technologies

    ¼öÀÔ
    Military Ethics and Emerging Technologies [ Paperback, 1st Edition ]
    Timothy J. Demy,George R. Lucas Jr.,Bradley J. Strawse | Routledge | 2024³â 10¿ù
    80,520¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. It discusses current thought on ethics and emerging technologies from internationally-recognized scholars addressing the full spectrum of issues in present warfare technology.This book...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Introduction to Cryptography with Open-Source Software

    Alasdair McAndre | CRC Press | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The author, a noted educator in the field, covers the meth...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Information Services Design

    Information Services Design A Design Science Approach for Sustainable Knowledge [ Paperback, 1st Edition ]
    Fons Wijnhove | Routledge | 2024³â 10¿ù
    80,520¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This book provides fundamental notions of information and its consequences for information service success, business models and processes, and architecture and exploitation. These topics are essential for modern curricula of management, communication science and information systems, and for anyone i...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Information Technology and Traditional Legal Concepts

    ¼öÀÔ
    Richard Jones,Roksana Moor | Routledge | 2024³â 10¿ù
    80,520¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,030¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    The internet has changed perceptions of privacy, criminality and ownership this book questions whether the underlying legal concepts should also change.This book was published as a special issue of International review of Law Computers and Technology.

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Human-Computer Interaction and Cybersecurity Handbook

    Human-Computer Interaction and Cybersecurity Handbook [ Paperback, 1st Edition, Illustrations, Color ]
    Abbas Moalle | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable resource for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Handbook of Financial Cryptography and Security

    Burton Rosenber | Chapman and Hall/CRC | 2024³â 10¿ù
    90,590¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,530¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This useful handbook elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial ...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Group Theoretic Cryptography

    Group Theoretic Cryptography [ Paperback, 1st Edition ]
    Maria Isabel Gonz?lez Vasco,Rainer Steinwand | Chapman and Hall/CRC | 2024³â 10¿ù
    138,920¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 6,950¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptography. It provides an introduction to cryptography w...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Blockchain Technology for Cyber Defense, Cyber Security, and Countermeasures

    ¼öÀÔ
    Blockchain Technology for Cyber Defense, Cyber Security, and Countermeasures Techniques, Solutions, and Applications [ Hardback, 1st Edition ]
    Naresh Kshetri,Purnendu Shekhar Pandey,Mohiuddin Ahme | CRC Press | 2025³â 01¿ù
    221,500¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,080¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks as a part of cybersecurity, information security a...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Behavioral Cybersecurity

    ¼öÀÔ
    Behavioral Cybersecurity Applications of Personality Psychology and Computer Science [ Paperback, 1st Edition ]
    Wayne Patterson,Cynthia E. Winston-Procto | CRC Press | 2024³â 10¿ù
    92,610¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 4,640¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    Cybersecurity has had far too little study and research. Research that has taken place, was done by those with computer science, electrical engineering, and mathematics backgrounds. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psycholo...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Access Control, Security, and Trust

    Access Control, Security, and Trust A Logical Approach [ Paperback, 1st Edition ]
    Shiu-Kai Chin,Susan Beth Olde | Chapman and Hall/CRC | 2024³â 10¿ù
    114,750¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 5,740¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This book equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access cont...

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Securing the Digital Realm

    ¼öÀÔ
    Securing the Digital Realm Advances in Hardware and Software Security, Communication, and Forensics [ Hardback, 1st Edition ]
    Muhammad Arif,M. Arfan Jaffar,Oana Geman,Waseem Abbas | CRC Press | 2025³â 02¿ù
    221,500¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,080¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This book "Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics" is a comprehensive guide that explores the intricate world of digital security and forensics.

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
  • Ransomware Evolution

    ¼öÀÔ
    Ransomware Evolution [ Hardback, 1st Edition ]
    Mohiuddin Ahme | CRC Press | 2025³â 01¿ù
    221,500¿ø (10% ÇÒÀÎ) Æ÷ÀÎÆ®Àû¸³ 11,080¿ø
    »óÇ° ÆǸŰ¡ ½ÃÀÛµÇ¸é ¾Ë·Áµå¸³´Ï´Ù. ÆǸŽÃÀÛ ¾Ë¸² ¼­ºñ½º¶õ? ½ÅûÇϱâ
    This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.

    ¹ÌÃâ°£

    ¸®½ºÆ®¿¡ ³Ö±â
SeachAPI:Y



¸ÇÀ§·Î
¿¹½ºÀ̽ʻç(ÁÖ)
´ëÇ¥ : ±è¼®È¯, ÃÖ¼¼¶ó ÁÖ¼Ò : ¼­¿ï½Ã ¿µµîÆ÷±¸ ÀºÇà·Î 11, 5Ãþ~6Ãþ(¿©Àǵµµ¿,ÀϽźôµù) »ç¾÷ÀÚµî·Ï¹øÈ£ : 229-81-37000   Åë½ÅÆǸž÷½Å°í : Á¦ 2005-02682È£ »ç¾÷ÀÚ Á¤º¸È®ÀÎ À̸ÞÀÏ : yes24help@yes24.com   È£½ºÆà ¼­ºñ½º»ç¾÷ÀÚ : ¿¹½ºÀ̽ʻç(ÁÖ)
YES24 ¼ö»ó³»¿ª Á¤º¸º¸È£ °ü¸®Ã¼°è ISMSÀÎÁõȹµæ °³ÀÎÁ¤º¸º¸È£ ¿ì¼ö»çÀÌÆ®
¼ÒºñÀÚÇÇÇغ¸»óº¸Çè ¼­¿ïº¸Áõº¸Çè
°í°´´ÔÀº ¾ÈÀü°Å·¡¸¦ À§ÇØ Çö±Ý µîÀ¸·Î °áÁ¦ ½Ã ÀúÈñ ¼îÇθô¿¡¼­ °¡ÀÔÇÑ ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ ÀÌ¿ëÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù. ¼­ºñ½º°¡ÀÔ»ç½Ç È®ÀÎ
EQUUS6