·Î±×ÀÎ ¤Ó ȸ¿ø°¡ÀÔ ¤Ó Àå¹Ù±¸´Ï ¤Ó °í°´¼¾ÅÍ ¤Ó ¸¶ÀÌÆäÀÌÁö ¤Ó ȸ»ç¼Ò°³
kangcom
Àüü
ÄÄÇ»ÅÍ IT
°ÇÃà
µðÀÚÀÎ
¹®ÇÐ
¾ð¾î/¾ð¾îÇÐ
Àι®»çȸ
ºñÁî´Ï½º/°æÁ¦
ÀÚ¿¬°úÇÐ/±â¼ú°úÇÐ
ÀÇÇÐ/°Ç°­
¿ª»ç/Áö¸®/°ü±¤
¿¹¼ú/´ëÁß¹®È­
¾Æµ¿¹®ÇÐ
À¯¾Æ/¾î¸°ÀÌ
Ãë¹Ì/½Ç¿ë
¿ä¸®
»çÀü·ù/Âü°íÀÚ·á
¼öÇè¼­/ÀÚ°ÝÁõ/Ãë¾÷
¿¬¼Ó°£Ç๰
º¸¾È/¾ÈÀü
  È¨  >   > 
  ¹ÙÀÌ·¯½º (162)   ¾ÏÈ£¹ý (36)   ÀϹݠ(872)
C ¾ð¾î ÇÁ·Î±×·¡¹Ö (À±»ó±Õ ¿Ü)
È«¸ª°úÇÐÃâÆÇ»ç I À±»ó±Õ
ÃֽŠÅë½ÅÀÌ·Ð
ÁÖ½Äȸ»ç »ý´ÉÃâ... I À±³²ÀÏ
¸ÖƼ¹Ìµð¾î ¹è¿òÅÍ 2.0
ÁÖ½Äȸ»ç »ý´ÉÃâ... I ÃÖÀ±Ã¶, ÀÓ¼ø¹ü
MySQL°ú ¸ð¹ÙÀÏ À¥À¸·Î ¸¸³ª´Â µ¥ÀÌÅͺ£À̽ºÀÇ Á¤¼®
¹è¿òÅÍ I ¹Ú¼ºÁø
Á¤»óÆÇ¸Å »óǰ¸¸ º¸±â ǰÀý/ÀýÆÇ »óǰ¸¸ º¸±â Ãâ°£¿¹Á¤ »óǰ¸¸ º¸±â  
¡Ø ¼±ÅúоßÀÇ Á¤»óÆÇ¸Å µµ¼­Á¾¼ö : ÃÑ 1,070 Á¾ ÀÔ´Ï´Ù.
óÀ½ ÀÌÀü   1  2  3  4  5  6  7  8  9  10   ´ÙÀ½ ¸¶Áö¸·
  Troubleshooting Linux Firewalls  
Addison-Wesley Professional | Michael Shinn | ¿ø¼­ | 2011-02-09  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 63,000¿ø ¡æ ÆÇ¸Å°¡ 44,100¿ø (30%) | ¸¶Àϸ®Áö 440¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
- Security experts Stephen Northcutt and Ed Skoudis have confirmed that there is a gap in existing books as far as diagnostics are concerned-this book fills that gap.- Shinn and Shinn a...
  Troubleshooting Linux Firewalls  
Addison-Wesley Professional | Michael Shinn | ¿ø¼­ | 2011-02-09  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 63,000¿ø ¡æ ÆÇ¸Å°¡ 44,100¿ø (30%) | ¸¶Àϸ®Áö 440¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
- Security experts Stephen Northcutt and Ed Skoudis have confirmed that there is a gap in existing books as far as diagnostics are concerned-this book fills that gap.- Shinn and Shinn a...
  Cryptography and Security Services: Mechanisms and Applications  
Cybertech Publishing | Manuel Mogollon | ¿ø¼­ | 2011-01-18  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 145,900¿ø ¡æ ÆÇ¸Å°¡ 119,600¿ø (18%) | ¸¶Àϸ®Áö 1,460¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies mus...
  Applied Oracle Security: Developing Secure Database and Middleware Environments  
McGraw-Hill | David Knox | ¿ø¼­ | 2009-10-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 92,200¿ø ¡æ ÆÇ¸Å°¡ 62,200¿ø (33%) | ¸¶Àϸ®Áö 620¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~9ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle datab...
  Applied Oracle Security: Developing Secure Database and Middleware Environments  
McGraw-Hill | David Knox | ¿ø¼­ | 2009-10-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 92,200¿ø ¡æ ÆÇ¸Å°¡ 62,200¿ø (33%) | ¸¶Àϸ®Áö 620¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~9ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle datab...
  The Myths of Security: What the Computer Security Industry Doesn't Want You to Know  
O'Reilly Media | John Viega | ¿ø¼­ | 2009-06-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 39,000¿ø ¡æ ÆÇ¸Å°¡ 35,100¿ø (10%) | ¸¶Àϸ®Áö 350¿ø(1%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
  Information Security Metrics: A Definitive Guide to Effective Security Monitoring and Measurement  
Auerbach Publications | W. Krag, Brotby | ¿ø¼­ | 2009-03-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 122,600¿ø ¡æ ÆÇ¸Å°¡ 92,000¿ø (25%) | ¸¶Àϸ®Áö 1,230¿ø(1%)
¿¹»óÀÔ°í±â°£: 21~30ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
  Security Monitoring  
O'Reilly Media | Martin Nystrom | ¿ø¼­ | 2009-02-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 70,000¿ø ¡æ ÆÇ¸Å°¡ 63,000¿ø (10%) | ¸¶Àϸ®Áö 630¿ø(1%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Showing users how to effectively deploy network security monitoring to defend a company against the most urgent threats, this book guides readers on defining policies that specify what ...
  Disappearing Cryptography: Information Hiding: Steganography & Watermarking  
Morgan Kaufmann | Peter Wayner | ¿ø¼­ | 2008-12-31  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 69,000¿ø ¡æ ÆÇ¸Å°¡ 62,100¿ø (10%) | ¸¶Àϸ®Áö 0¿ø(0%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
  Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets  
Butterworth-Heinemann | John Mallery | ¿ø¼­ | 2008-12-31  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 69,000¿ø ¡æ ÆÇ¸Å°¡ 62,100¿ø (10%) | ¸¶Àϸ®Áö 620¿ø(1%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves emp...
  Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking  
Auerbach Publications | Raoul Chiesa | ¿ø¼­ | 2008-12-11  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 84,600¿ø ¡æ ÆÇ¸Å°¡ 63,500¿ø (25%) | ¸¶Àϸ®Áö 850¿ø(1%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted terr...
  ¿­Ç÷°­ÀÇ À¥ ÇØÅ·°ú ¹æ¾î  
ÇÁ¸®·º | ÃÖ°æÃ¶ | ±¹³»¼­ | 2008-12-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 28,000¿ø ¡æ ÆÇ¸Å°¡ 25,200¿ø (10%) | ¸¶Àϸ®Áö 1,260¿ø(5%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
¡á ÀÌ Ã¥ÀÇ Æ¯Â¡´Ù¾çÇÑ ¾Ç¼º ÄÚµå »ùÇÃÀ» Á¦½ÃÇÏ¿© ÀÌÇØµµ¸¦ ³ôÀÓ½ÇÁ¦ ¿î¿µ°ú °³¹ß ½Ã Âü°íÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ Âü°í ÀÚ·á ¼ö·Ï¿©·¯ °¡Áö °ø°Ý ·Î±× µî dzºÎÇÑ ½ÇÁ¦ »ç·Ê¸¦ ´Ù·ë¹®Á¦ ¿¹¹æ, ¹®Á¦ ¹ß°ß°ú...
  ¿­Ç÷°­ÀÇ À¥ ÇØÅ·°ú ¹æ¾î  
ÇÁ¸®·º | ÃÖ°æÃ¶ | ±¹³»¼­ | 2008-12-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 28,000¿ø ¡æ ÆÇ¸Å°¡ 25,200¿ø (10%) | ¸¶Àϸ®Áö 1,260¿ø(5%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
¡á ÀÌ Ã¥ÀÇ Æ¯Â¡´Ù¾çÇÑ ¾Ç¼º ÄÚµå »ùÇÃÀ» Á¦½ÃÇÏ¿© ÀÌÇØµµ¸¦ ³ôÀÓ½ÇÁ¦ ¿î¿µ°ú °³¹ß ½Ã Âü°íÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ Âü°í ÀÚ·á ¼ö·Ï¿©·¯ °¡Áö °ø°Ý ·Î±× µî dzºÎÇÑ ½ÇÁ¦ »ç·Ê¸¦ ´Ù·ë¹®Á¦ ¿¹¹æ, ¹®Á¦ ¹ß°ß°ú...
  À¥ ÇØÅ· & º¸¾È ¿Ïº® °¡ÀÌµå  
¿¡ÀÌÄÜ | ´ëÇÇµå ½ºÅõŸµå , ¸¶Ä¿½º ÇÉÅä | ¹ø¿ª¼­ | 2008-11-21  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 40,000¿ø ¡æ ÆÇ¸Å°¡ 36,000¿ø (10%) | ¸¶Àϸ®Áö 1,800¿ø(5%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
À¥ ÇØÅ·°ú º¸¾ÈÀÇ ½ÇÀü°¨°¢À» Ű¿ì´Ù! '¿¡ÀÌÄÜ ÇØÅ·¤ýº¸¾È' ½Ã¸®Áî, Á¦19±Ç ¡ºÀ¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵塻. ÇØÅ·¤ýº¸¾È Àü¹®°¡µéÀÌ Àú¼úÇÑ, À¥ ÇØÅ·°ú º¸¾È¿¡ ´ëÇÑ ½ÇÀü¼­´Ù. ¾ÇÀÇÀûÀÎ ÇØÄ¿°¡ À¥...
  À¥ ÇØÅ· & º¸¾È ¿Ïº® °¡ÀÌµå  
¿¡ÀÌÄÜ | ´ëÇÇµå ½ºÅõŸµå , ¸¶Ä¿½º ÇÉÅä | ¹ø¿ª¼­ | 2008-11-21  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 40,000¿ø ¡æ ÆÇ¸Å°¡ 36,000¿ø (10%) | ¸¶Àϸ®Áö 1,800¿ø(5%)
¿¹»óÀÔ°í±â°£: 7~12ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
À¥ ÇØÅ·°ú º¸¾ÈÀÇ ½ÇÀü°¨°¢À» Ű¿ì´Ù! '¿¡ÀÌÄÜ ÇØÅ·¤ýº¸¾È' ½Ã¸®Áî, Á¦19±Ç ¡ºÀ¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵塻. ÇØÅ·¤ýº¸¾È Àü¹®°¡µéÀÌ Àú¼úÇÑ, À¥ ÇØÅ·°ú º¸¾È¿¡ ´ëÇÑ ½ÇÀü¼­´Ù. ¾ÇÀÇÀûÀÎ ÇØÄ¿°¡ À¥...
  Post Quantum Cryptography  
Springer | Daniel J. Bernstein | ¿ø¼­ | 2008-11-19  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 138,600¿ø ¡æ ÆÇ¸Å°¡ 104,000¿ø (25%) | ¸¶Àϸ®Áö 1,390¿ø(1%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographi...
  Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers  
Springer | Stefan Lucks | ¿ø¼­ | 2008-11-17  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 97,900¿ø ¡æ ÆÇ¸Å°¡ 79,300¿ø (19%) | ¸¶Àϸ®Áö 980¿ø(1%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full ...
  Ajax º¸¾È  
¿¡ÀÌÄÜ | Billy Hoffman/°íÇö¿µ | ¹ø¿ª¼­ | 2008-11-10  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 30,000¿ø ¡æ ÆÇ¸Å°¡ 27,000¿ø (10%) | ¸¶Àϸ®Áö 1,350¿ø(5%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
[¿ä ¾à]¾ÈÀüÇÏ°í °ß°íÇÑ Ajax À¥ ¾ÖÇø®ÄÉÀ̼ÇÀ» Á¦ÀÛÇØ¾ß ÇÏ´Â À¥ °³¹ßÀÚ¶ó¸é ´©±¸³ª ²À ¾Ë¾Æ¾ß ÇÒ Ajax °ü·Ã º¸¾È Ãë¾àÁ¡À» ¾Ë±â ½±°Ô ¼³¸íÇÑ ½Ç¿ë °¡À̵å. Ajax ¾ÖÇø®ÄÉÀ̼ÇÀÇ ÀáÀçÀû º¸¾È ¹®Á¦...
  Ajax º¸¾È  
¿¡ÀÌÄÜ | Billy Hoffman/°íÇö¿µ | ¹ø¿ª¼­ | 2008-11-10  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 30,000¿ø ¡æ ÆÇ¸Å°¡ 27,000¿ø (10%) | ¸¶Àϸ®Áö 1,350¿ø(5%)
¿¹»óÀÔ°í±â°£: 10~15ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
[¿ä ¾à]¾ÈÀüÇÏ°í °ß°íÇÑ Ajax À¥ ¾ÖÇø®ÄÉÀ̼ÇÀ» Á¦ÀÛÇØ¾ß ÇÏ´Â À¥ °³¹ßÀÚ¶ó¸é ´©±¸³ª ²À ¾Ë¾Æ¾ß ÇÒ Ajax °ü·Ã º¸¾È Ãë¾àÁ¡À» ¾Ë±â ½±°Ô ¼³¸íÇÑ ½Ç¿ë °¡À̵å. Ajax ¾ÖÇø®ÄÉÀ̼ÇÀÇ ÀáÀçÀû º¸¾È ¹®Á¦...
  Googling Security  
Addison-Wesley Professional | Greg Conti | ¿ø¼­ | 2008-11-01  
Á¾ÇÕÆòÁ¡ ¤Ó ¼­Æò(0°³)
Á¤°¡ 70,000¿ø ¡æ ÆÇ¸Å°¡ 51,800¿ø (26%) | ¸¶Àϸ®Áö 520¿ø(1%)
¿¹»óÀÔ°í±â°£: 21~30ÀÏ ¼Ò¿ä¿¹Á¤ (±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù. 1:1 µµ¼­¹®ÀÇ
Product DescriptionWhat Does Google Know about You? And Who Are They Telling? When you use Google¡¯s ¡°free¡± services, you pay, big time–with personal information about yourself....
óÀ½ ÀÌÀü   1  2  3  4  5  6  7  8  9  10   ´ÙÀ½ ¸¶Áö¸·
À̸ÞÀÏÁÖ¼Ò¼öÁý°ÅºÎ