·Î±×ÀÎ
¤Ó
ȸ¿ø°¡ÀÔ
¤Ó
Àå¹Ù±¸´Ï
¤Ó
°í°´¼¾ÅÍ
¤Ó
¸¶ÀÌÆäÀÌÁö
¤Ó
ȸ»ç¼Ò°³
Àüü
Àüü
±¹³»µµ¼
¿Ü±¹µµ¼
Àαâ°Ë»ö¾î
ÀϹÝ
ÀΰøÁö´É
¼ÒÇÁÆ®¿þ¾î
CAD-CAM
°è»ê±â
CD-ROM
ÄÄÆÄÀÏ·¯
ÄÄÇ»Åͱ¸Á¶
ÄÄÇ»Åͱ׷¡ÇȽº
ÄÄÇ»ÅÍ »ç¿ë ´É·Â
ÄÄÇ»ÅͰúÇÐ
º¸¾È/¾ÈÀü
ÄÄÇ»ÅͺñÀü
»çÀ̹ö³×ƽ½º
ÀÚ·áó¸®
º¹¿ø
µ¥ÀÌÅÍ Àü¼Û
µ¥ÀÌÅͺ£À̽º°ü¸®
ÀüÀÚÃâÆÇ
±³À° ¼ÒÇÁÆ®¿þ¾î
ÄÄÇ»ÅÍ IT
ÀϹÝ
°ÇÃàºñÆò
°ÇÃàµðÀÚÀÎ
°ÇÃà»ç
°ÇÃà°¡
½Ç³»µðÀÚÀÎ
Á¶°æ
°ÇÃà°èȹ
°ø°ø°Ç¹°/»ê¾÷ºôµù
Âü°íÀÚ·á
°ÇÃàÇÐ
¹®ÈÀ纸Á¸
½Ç½À
Á¾±³¹°
ÇÁ·ÎÁ§Æ® °ü¸®
±¹Á¦ °ÇÃà¼ú
°ÇÃàȸ»ç
īŻ·Î±×/Àü½Ãȸ
Áö¿ª
°Ç¹°
°ÇÃà
ÀϹÝ
Ã¥
Ŭ¸³¾ÆÆ®
Àå½ÄÀûÀÎ ¿¹¼ú
¿¡¼¼ÀÌ
À¯Çà
°¡±¸
Graphic Arts
¿ª»ç & ºñÆÇ
»ê¾÷
ÀÎÅ׸®¾î
Á¦Ç°
Âü°íÀÚ·á
Á÷¹° & º¹Àå
µðÀÚÀÎ
µå¶ó¸¶/Èñ°î
¸¸È
ÀϹÝ
¹®ÇкñÆò
½Ã
À¯¸Ó
Àü±â/ÀÚ¼Àü
¼Ò¼³
¹®ÇÐÀÌ·Ð
¹®ÇÐ
ÀϹÝ
¾ËÆÄºª
Ä¿¹Â´ÏÄÉÀ̼Ç
±Û¾²±â/ÀÛ¹®
¹®¹ý
¼Õ±Û¾¾
Àú³Î¸®Áò
¾ð¾îÇÐ
¹®ÇÐ
À½¼ºÇÐ
Àбâ
¼ö»çÇÐ
Àǹ̷Ð
¼öÈ
¿¬¼³
öÀÚ¹ý
¾ð¾î±³À°
¾îÈÖ
ÆíÁý/±³Á¤
¹ø¿ª/ÇØ¼®
¾ð¾î/¾ð¾îÇÐ
°¡Á¤/»çȸ»ýȰ
±³À°
¹üÁË
¹ýÇÐ
»çȸÇÐ
½É¸®ÇÐ
Á¤½Å
Á¾±³
öÇÐ
ÇнÀµµ±¸
»çȸÇÐ
´ëÇб³Àç
µ¶¼/±Û¾²±â
¹®ÇÐÀÌ·Ð
¹®ÇåÁ¤º¸ÇÐ
¾ð¾îÇÐ
¿ªÇÐ/»çÁÖ
À¯¾Æ±³À°
Àι®±³¾ç¹®°í
Àι®ÇÐÀϹÝ
Àι®»çȸ
ÀϹÝ
ȸ°è
ºñÁî´Ï½ºÄ¿¹Â´ÏÄÉÀ̼Ç
°æ·Â°ü¸®
º¸Çè
ÅõÀÚ & ¾ÈÀü
°æ·Â
³ë»ç¹®Á¦
¸¶ÄÉÆÃ
À繫
ºÎµ¿»ê
ÂüÁ¶
°æ·Â°ü¸®
ÆÇ¸Å°ü¸®
¼ÒÈ£/¼Ò±â¾÷
¼¼±Ý
°æÁ¦
°³º°»ê¾÷
ºñ¼
e-business
ºñÁî´Ï½º/°æÁ¦
°úÇÐ
ÈÇÐ
»ý¸í°øÇÐ
°úÇбâ¼ú
³óÇÐ
°ÇÃà
ÀüÀÚ°øÇÐ
engineering
»ê¾÷µðÀÚÀÎ
±³Åë
¼öÇÐ
ÀÚ¿¬
°øÇÐÀϹÝ/»ê¾÷°øÇÐ
»ýȰ°úÇÐ
Åä¸ñ/°Ç¼³
ȯ°æ/¼Ò¹æ/µµ½Ã/Á¶°æ
ÀÚ¿¬°úÇÐ/±â¼ú°úÇÐ
°Ç°
Áúº´
ÀÇÇÐ
°ø°øÀÇ·á
Ä¡ÀÇÇÐ
½Å°æÇÐ
°£È£ÇÐ
Á¤½Å°ú
¼öÀÇÇÐ
¼ö¼ú
¾àÇÐ
ºñ´¢±â°ú
ÀÇÇÐ/°Ç°
¿©Çà
¿ª»ç
½ÅÈ
¿ª»ç/Áö¸®/°ü±¤
°ø¿¬¿¹¼ú
»çÁø
¿¹¼ú
À½¾Ç
·¹ÄÚµåÀ½¾Ç
Áý²Ù¹Ì±â
ÆÐ¼Ç/ÀÇ·ù
¿¹¼ú/´ëÁß¹®È
ÀϹÝ
Ȱµ¿ & ¸ðÇè
µ¿¹°
¿¹¼ú
Àü±â
¼Ò³â/³²ÀÚ
»ç¾÷, °æ·Â, Á¡·É
°íÀü
¸¸È
ÄÁ¼ÁºÏ
Bedtime & Dreams
ÀÎÁ¾
µ¿È/Àü·¡µ¿È
°¡Á·
¿©ÀÚ¾ÆÀÌ
°Ç°/º¸°Ç
¿ª»ç
ÈÞÀÏ/ÃàÁ¦
°øÆ÷ & ±«´ã
ÇØÇÐ À̾߱â
¾Æµ¿¹®ÇÐ
ÀϹÝ
¾×ƼºñƼºÏ
µ¿¹°
¿¹¼ú
Àü±â/ÀÚ¼Àü
ÄÄÇ»ÅÍ
ÄÁ¼ÁºÏ
¿ä¸®
Ãë¹Ì/¿¹¼ú
µå¶ó¸¶
ÀÎÁ¾
°¡Á·
¿Ü±¹¾î ÇнÀ
°ÔÀÓ
Gardening
¿©ÀÚ¾ÆÀÌ
°Ç°/º¸°Ç
¿ª»ç
ÈÞÀÏ/ÃàÁ¦
À¯¸Ó
À¯¾Æ/¾î¸°ÀÌ
°ÔÀÓ
°íÀü/¼öÁý
½ºÆ÷Ã÷/¿©°¡
¾Ö¿Ïµ¿¹°
¿ø¿¹
Ãë¹Ì/°ø¿¹
¿µ»ó & ÀüÀÚ
°¡Á¤/»ýȰ
Ãë¹Ì/½Ç¿ë
ÀϹÝ
Áö¿ªº°
ÄÚ½º
Á¶¸®¹ý
°Ç°½Ä/Ä¡·á½Ä
À½·á
¼Õ´ÔÁ¢´ë
Àç·áº°
Å×ÀÌºí¼¼ÆÃ
ä½ÄÁÖÀÇ
°èÀýº°
À¯¾Æ½Ä
¿ä¸®
ÀϹÝ
¿¬°¨
ÁöµµÃ¥
¼Áö »öÀÎ
īŻ·Î±×
ȍ˟
µð·ºÅ丮
¹é°ú»çÀü
Áöµµ
±Û¾²±â
¿¬°¨
Æí¶÷/¸Å´º¾ó
»çÀü·ù/Âü°íÀÚ·á
ÀϹÝ
°ø¹«¿ø ¼öÇè¼
±¹°¡°í½Ã
°ø»ç/±â¾÷ ¼öÇè¼
¾È³»¼
ÄÄÇ»ÅÍ
Àι®/»çȸ/¹ý °ü·Ã
°æÁ¦/±ÝÀ¶/ȸ°è °ü·Ã
°ÇÃà/Åä¸ñ/±â°è°ü·Ã
°¡½º/¾ÈÀü/ȯ°æ °ü·Ã
À½½Ä/¹Ì¿ë °ü·Ã
ÀÇÇÐ/À§»ý °ü·Ã
º¸°Ç/ÀÇ·á °ü·Ã
¿îÀü/°ü±¤/±âŸ °ü·Ã
Ãë¾÷/»ó½Ä/¸éÁ¢
ÁøÇÐ/À¯ÇÐ
´ëÇб³Àç
ÀüÀÚ/Àü±â °ü·Ã
¼öÇè¼/ÀÚ°ÝÁõ/Ãë¾÷
ÀϹÝ
¾Ö¿Ïµ¿¹°/µ¿¹°
¿¹¼ú
ºñÁî´Ï½º
ÄÄÇ»ÅÍ
Ãë¹Ì
½Ã»ç
Àü±â/ÀüÀÚ
¿£ÅÍÅ×ÀÎ¸ÕÆ®
food/wine
°ÔÀÓ/¸¸È
lifestyle
¿£ÅÍÅ×ÀÎ¸ÕÆ®
¿ª»ç
°Ç°
Ãë¹Ì
home/housing
½ºÆ÷Ã÷
¹®ÇÐ
³²¼º
¿¬¼Ó°£Ç๰
º¸¾È/¾ÈÀü
Ȩ
>
°ÇÃà
µðÀÚÀÎ
¹®ÇÐ
¹ÌºÐ·ù
ºñÁî´Ï½º/°æÁ¦
»çÀü·ù/Âü°íÀÚ·á
¼öÇè¼/ÀÚ°ÝÁõ/Ãë¾÷
¾Æµ¿¹®ÇÐ
¾ð¾î/¾ð¾îÇÐ
¿ª»ç/Áö¸®/°ü±¤
¿¬¼Ó°£Ç๰
¿¹¼ú/´ëÁß¹®È
¿ä¸®
À¯¾Æ/¾î¸°ÀÌ
ÀÇÇÐ/°Ç°
Àι®»çȸ
ÀÚ¿¬°úÇÐ/±â¼ú°úÇÐ
Ãë¹Ì/½Ç¿ë
ÄÄÇ»ÅÍ IT
>
°¡»óÇö½Ç
°³¹ß¹æ¹ý·Ð
°ÔÀÓ
°è»ê±â
±³À° ¼ÒÇÁÆ®¿þ¾î
±×·ì¿þ¾î
±â°èÀÌ·Ð
±â¾÷¼Ö·ç¼Ç
³×Æ®¿öÅ·
´ëÇб³Àç
µ¥½ºÅ©Å¾¿ë ¾ÖÇø®ÄÉÀ̼Ç
µ¥ÀÌÅÍ Àü¼Û
µ¥ÀÌÅ͸𵨸µ
µ¥ÀÌÅͺ£À̽º°ü¸®
µ¥ÀÌÅÍó¸®
µ¥ÀÌÅÍó¸®
µðÁöÅÐ ¸Åü
¸ÖƼ¹Ìµð¾î
¹®¼°ü¸®
º¸¾È
º¸¾È/¾ÈÀü
º¹¿ø
»ç¿ëÀÚ ÀÎÅÍÆäÀ̽º
»çÀ̹ö³×ƽ½º
»çȸÀûÀÎ ¾ç»ó
»ý¹° Á¤º¸ÇÐ
¼ÒÇÁÆ®¿þ¾î
¼ÒÇÁÆ®¿þ¾î
¼ÒÇü 󸮱â
¼öÇÐ/Åë°è ¼ÒÇÁÆ®¿þ¾î
½ºÇÁ·¹µå½ÃÆ®
½Å°æ¸Á
¿ª»ç
¿Â¶óÀμºñ½º
¿î¿µÃ¼°è(OS)
¿öµå ÇÁ·Î¼¼½Ì
À¥
À¯Æ¿¸®Æ¼
ÀΰøÁö´É
ÀÎÅͳÝ
ÀϹÝ
ÀÚ°Ý/¼öÇè
ÀÚ·áó¸®
ÀÚ¿¬¾ð¾îó¸®
Àü¹®°¡ ½Ã½ºÅÛ
Àü»êÅë°è
Àü»êȸ°è
ÀüÀÚ»ó°Å·¡
ÀüÀÚÃâÆÇ
Á¤º¸°ü¸® ½Ã½ºÅÛ
Á¤º¸ÀúÀå/º¹±¸
Á¤º¸ÇÐ
ÂüÁ¶
ÄÄÆÄÀÏ·¯
ÄÄÇ»ÅÍ »ç¿ë ´É·Â
ÄÄÇ»ÅÍ ½Ã¹Ä·¹À̼Ç
ÄÄÇ»ÅÍ ¾Ö´Ï¸ÞÀ̼Ç
ÄÄÇ»ÅͰøÇÐ
ÄÄÇ»ÅͰúÇÐ
ÄÄÇ»Åͱ¸Á¶
ÄÄÇ»Åͱ׷¡ÇȽº
ÄÄÇ»ÅͺñÀü
ÄÄÇ»ÅÍ»ê¾÷
ÄÄÇ»ÅÍÀÔ¹®/Ȱ¿ë
Ŭ¶óÀ̾ðÆ®/¼¹ö ÄÄÇ»ÆÃ
Űº¸´õ
ÇÁ·¹Á¨Å×À̼Ç
ÇÁ·Î±×·¡¹Ö
ÇÁ·Î±×·¡¹Ö¾ð¾î
ÇÁ·ÎÁ§Æ®°ü¸®
Çϵå¿þ¾î
È»ó ó¸®
CAD-CAM
CD-ROM
OA/»ç¹«ÀÚµ¿È
System Administration
¹ÙÀÌ·¯½º
(162)
¾ÏÈ£¹ý
(36)
ÀϹÝ
(872)
¸®¾×Æ® & ¸®¾×Æ® ³×ÀÌÆ¼ºê ÅëÇÕ ±³°ú¼
¿¡ÀÌÄÜ I ¾Æ´ã º¸µÎÄ¡
¸Ó½Å ·¯´× ±³°ú¼ with ÆÄÀ̽ã, »çÀÌŶ·±, ÅÙ¼Ç÷Î
±æ¹þ I ¼¼¹Ù½ºÂù ¶ó½ÃÄ«...
ÇÔ²² ÀÚ¶ó±â
Insight (ÀλçÀÌ... I ±èâÁØ
ÄÚÆ²¸° ÇÁ·Î±×·¡¹Ö
¿¡ÀÌÄÜ I ½ºÆ¼ºì »ç¹«¿¤, ...
Àüüµµ¼
±¹³»¼
¹ø¿ª¼
¿ø¼
ÀâÁö
¿À¸§Â÷¼ø
³»¸²Â÷¼ø
¡Ø ¼±ÅúоßÀÇ
Á¤»óÆÇ¸Å
µµ¼Á¾¼ö :
ÃÑ 1,070 Á¾
ÀÔ´Ï´Ù.
1
2
3
4
5
6
7
8
9
10
Troubleshooting Linux Firewalls
Addison-Wesley Professional
|
Michael Shinn
| ¿ø¼ | 2011-02-09
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 63,000¿ø
¡æ
ÆÇ¸Å°¡ 44,100¿ø
(30%
) | ¸¶Àϸ®Áö 440¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
- Security experts Stephen Northcutt and Ed Skoudis have confirmed that there is a gap in existing books as far as diagnostics are concerned-this book fills that gap.- Shinn and Shinn a...
Troubleshooting Linux Firewalls
Addison-Wesley Professional
|
Michael Shinn
| ¿ø¼ | 2011-02-09
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 63,000¿ø
¡æ
ÆÇ¸Å°¡ 44,100¿ø
(30%
) | ¸¶Àϸ®Áö 440¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
- Security experts Stephen Northcutt and Ed Skoudis have confirmed that there is a gap in existing books as far as diagnostics are concerned-this book fills that gap.- Shinn and Shinn a...
Cryptography and Security Services: Mechanisms and Applications
Cybertech Publishing
|
Manuel Mogollon
| ¿ø¼ | 2011-01-18
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 145,900¿ø
¡æ
ÆÇ¸Å°¡ 119,600¿ø
(18%
) | ¸¶Àϸ®Áö 1,460¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies mus...
Applied Oracle Security: Developing Secure Database and Middleware Environments
McGraw-Hill
|
David Knox
| ¿ø¼ | 2009-10-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 92,200¿ø
¡æ
ÆÇ¸Å°¡ 62,200¿ø
(33%
) | ¸¶Àϸ®Áö 620¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~9ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle datab...
Applied Oracle Security: Developing Secure Database and Middleware Environments
McGraw-Hill
|
David Knox
| ¿ø¼ | 2009-10-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 92,200¿ø
¡æ
ÆÇ¸Å°¡ 62,200¿ø
(33%
) | ¸¶Àϸ®Áö 620¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~9ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Cutting-edge techniques from leading Oracle security expertsThis Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle datab...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
O'Reilly Media
|
John Viega
| ¿ø¼ | 2009-06-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 39,000¿ø
¡æ
ÆÇ¸Å°¡ 35,100¿ø
(10%
) | ¸¶Àϸ®Áö 350¿ø(
1%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Information Security Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
Auerbach Publications
|
W. Krag, Brotby
| ¿ø¼ | 2009-03-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 122,600¿ø
¡æ
ÆÇ¸Å°¡ 92,000¿ø
(25%
) | ¸¶Àϸ®Áö 1,230¿ø(
1%)
¿¹»óÀÔ°í±â°£:
21~30ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Security Monitoring
O'Reilly Media
|
Martin Nystrom
| ¿ø¼ | 2009-02-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 70,000¿ø
¡æ
ÆÇ¸Å°¡ 63,000¿ø
(10%
) | ¸¶Àϸ®Áö 630¿ø(
1%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Showing users how to effectively deploy network security monitoring to defend a company against the most urgent threats, this book guides readers on defining policies that specify what ...
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets
Butterworth-Heinemann
|
John Mallery
| ¿ø¼ | 2008-12-31
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 69,000¿ø
¡æ
ÆÇ¸Å°¡ 62,100¿ø
(10%
) | ¸¶Àϸ®Áö 620¿ø(
1%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves emp...
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Morgan Kaufmann
|
Peter Wayner
| ¿ø¼ | 2008-12-31
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 69,000¿ø
¡æ
ÆÇ¸Å°¡ 62,100¿ø
(10%
) | ¸¶Àϸ®Áö 0¿ø(
0%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Auerbach Publications
|
Raoul Chiesa
| ¿ø¼ | 2008-12-11
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 84,600¿ø
¡æ
ÆÇ¸Å°¡ 63,500¿ø
(25%
) | ¸¶Àϸ®Áö 850¿ø(
1%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted terr...
¿Ç÷°ÀÇ À¥ ÇØÅ·°ú ¹æ¾î
ÇÁ¸®·º
|
ÃÖ°æÃ¶
| ±¹³»¼ | 2008-12-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 28,000¿ø
¡æ
ÆÇ¸Å°¡ 25,200¿ø
(10%
) | ¸¶Àϸ®Áö 1,260¿ø(
5%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
¡á ÀÌ Ã¥ÀÇ Æ¯Â¡´Ù¾çÇÑ ¾Ç¼º ÄÚµå »ùÇÃÀ» Á¦½ÃÇÏ¿© ÀÌÇØµµ¸¦ ³ôÀÓ½ÇÁ¦ ¿î¿µ°ú °³¹ß ½Ã Âü°íÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ Âü°í ÀÚ·á ¼ö·Ï¿©·¯ °¡Áö °ø°Ý ·Î±× µî dzºÎÇÑ ½ÇÁ¦ »ç·Ê¸¦ ´Ù·ë¹®Á¦ ¿¹¹æ, ¹®Á¦ ¹ß°ß°ú...
¿Ç÷°ÀÇ À¥ ÇØÅ·°ú ¹æ¾î
ÇÁ¸®·º
|
ÃÖ°æÃ¶
| ±¹³»¼ | 2008-12-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 28,000¿ø
¡æ
ÆÇ¸Å°¡ 25,200¿ø
(10%
) | ¸¶Àϸ®Áö 1,260¿ø(
5%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
¡á ÀÌ Ã¥ÀÇ Æ¯Â¡´Ù¾çÇÑ ¾Ç¼º ÄÚµå »ùÇÃÀ» Á¦½ÃÇÏ¿© ÀÌÇØµµ¸¦ ³ôÀÓ½ÇÁ¦ ¿î¿µ°ú °³¹ß ½Ã Âü°íÇÒ ¼ö ÀÖ´Â ´Ù¾çÇÑ Âü°í ÀÚ·á ¼ö·Ï¿©·¯ °¡Áö °ø°Ý ·Î±× µî dzºÎÇÑ ½ÇÁ¦ »ç·Ê¸¦ ´Ù·ë¹®Á¦ ¿¹¹æ, ¹®Á¦ ¹ß°ß°ú...
À¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵å
¿¡ÀÌÄÜ
|
´ëÇÇµå ½ºÅõŸµå , ¸¶Ä¿½º ÇÉÅä
| ¹ø¿ª¼ | 2008-11-21
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 40,000¿ø
¡æ
ÆÇ¸Å°¡ 36,000¿ø
(10%
) | ¸¶Àϸ®Áö 1,800¿ø(
5%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
À¥ ÇØÅ·°ú º¸¾ÈÀÇ ½ÇÀü°¨°¢À» Ű¿ì´Ù! '¿¡ÀÌÄÜ ÇØÅ·¤ýº¸¾È' ½Ã¸®Áî, Á¦19±Ç ¡ºÀ¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵塻. ÇØÅ·¤ýº¸¾È Àü¹®°¡µéÀÌ Àú¼úÇÑ, À¥ ÇØÅ·°ú º¸¾È¿¡ ´ëÇÑ ½ÇÀü¼´Ù. ¾ÇÀÇÀûÀÎ ÇØÄ¿°¡ À¥...
À¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵å
¿¡ÀÌÄÜ
|
´ëÇÇµå ½ºÅõŸµå , ¸¶Ä¿½º ÇÉÅä
| ¹ø¿ª¼ | 2008-11-21
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 40,000¿ø
¡æ
ÆÇ¸Å°¡ 36,000¿ø
(10%
) | ¸¶Àϸ®Áö 1,800¿ø(
5%)
¿¹»óÀÔ°í±â°£:
7~12ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
À¥ ÇØÅ·°ú º¸¾ÈÀÇ ½ÇÀü°¨°¢À» Ű¿ì´Ù! '¿¡ÀÌÄÜ ÇØÅ·¤ýº¸¾È' ½Ã¸®Áî, Á¦19±Ç ¡ºÀ¥ ÇØÅ· & º¸¾È ¿Ïº® °¡À̵塻. ÇØÅ·¤ýº¸¾È Àü¹®°¡µéÀÌ Àú¼úÇÑ, À¥ ÇØÅ·°ú º¸¾È¿¡ ´ëÇÑ ½ÇÀü¼´Ù. ¾ÇÀÇÀûÀÎ ÇØÄ¿°¡ À¥...
Post Quantum Cryptography
Springer
|
Daniel J. Bernstein
| ¿ø¼ | 2008-11-19
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 138,600¿ø
¡æ
ÆÇ¸Å°¡ 104,000¿ø
(25%
) | ¸¶Àϸ®Áö 1,390¿ø(
1%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographi...
Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
Springer
|
Stefan Lucks
| ¿ø¼ | 2008-11-17
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 97,900¿ø
¡æ
ÆÇ¸Å°¡ 79,300¿ø
(19%
) | ¸¶Àϸ®Áö 980¿ø(
1%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007, held in Bochum, Germany, in July 2007 The 12 revised full ...
Ajax º¸¾È
¿¡ÀÌÄÜ
|
Billy Hoffman/°íÇö¿µ
| ¹ø¿ª¼ | 2008-11-10
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 30,000¿ø
¡æ
ÆÇ¸Å°¡ 27,000¿ø
(10%
) | ¸¶Àϸ®Áö 1,350¿ø(
5%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
[¿ä ¾à]¾ÈÀüÇÏ°í °ß°íÇÑ Ajax À¥ ¾ÖÇø®ÄÉÀ̼ÇÀ» Á¦ÀÛÇØ¾ß ÇÏ´Â À¥ °³¹ßÀÚ¶ó¸é ´©±¸³ª ²À ¾Ë¾Æ¾ß ÇÒ Ajax °ü·Ã º¸¾È Ãë¾àÁ¡À» ¾Ë±â ½±°Ô ¼³¸íÇÑ ½Ç¿ë °¡À̵å. Ajax ¾ÖÇø®ÄÉÀ̼ÇÀÇ ÀáÀçÀû º¸¾È ¹®Á¦...
Ajax º¸¾È
¿¡ÀÌÄÜ
|
Billy Hoffman/°íÇö¿µ
| ¹ø¿ª¼ | 2008-11-10
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 30,000¿ø
¡æ
ÆÇ¸Å°¡ 27,000¿ø
(10%
) | ¸¶Àϸ®Áö 1,350¿ø(
5%)
¿¹»óÀÔ°í±â°£:
10~15ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
[¿ä ¾à]¾ÈÀüÇÏ°í °ß°íÇÑ Ajax À¥ ¾ÖÇø®ÄÉÀ̼ÇÀ» Á¦ÀÛÇØ¾ß ÇÏ´Â À¥ °³¹ßÀÚ¶ó¸é ´©±¸³ª ²À ¾Ë¾Æ¾ß ÇÒ Ajax °ü·Ã º¸¾È Ãë¾àÁ¡À» ¾Ë±â ½±°Ô ¼³¸íÇÑ ½Ç¿ë °¡À̵å. Ajax ¾ÖÇø®ÄÉÀ̼ÇÀÇ ÀáÀçÀû º¸¾È ¹®Á¦...
Googling Security
Addison-Wesley Professional
|
Greg Conti
| ¿ø¼ | 2008-11-01
Á¾ÇÕÆòÁ¡
¤Ó
¼Æò(0°³)
Á¤°¡ 70,000¿ø
¡æ
ÆÇ¸Å°¡ 51,800¿ø
(26%
) | ¸¶Àϸ®Áö 520¿ø(
1%)
¿¹»óÀÔ°í±â°£:
21~30ÀÏ ¼Ò¿ä¿¹Á¤
(±Ù¹«ÀϱâÁØ)
ÇöÁö»çÁ¤¿¡ ÀÇÇØ Áö¿¬ µÉ ¼ö ÀÖ½À´Ï´Ù.
1:1 µµ¼¹®ÀÇ
Product DescriptionWhat Does Google Know about You? And Who Are They Telling? When you use Google¡¯s ¡°free¡± services, you pay, big time–with personal information about yourself....
1
2
3
4
5
6
7
8
9
10