º¸¾È Á¢¼Ó
ȸ¿ø°¡ÀÔ | ID/PW ã±â
  
 
 
´ëÁß¼Ò¼³
»ê¹®|¿¡¼¼ÀÌ|³íÇȼÇ
·Î¸Ç½º|ÇÒ¸®Äý·Î¸Ç½º
¾î¸°ÀÌ|¼º±³À°
û¼Ò³â
¹®ÇÐ|½Ã|¹®ÇÐÆò·Ð
Á¾±³|½ÅÈ­
°æ¿µ|°æÁ¦|ÀçÅ×Å©
ÀÚ±â°è¹ß
»çȸ°úÇÐ|»ç»ó|¿Ü±³
öÇÐ|¹®È­|Áö¼º|¿¹Àý
¿ª»ç|´ÙÅ¥¸àÅ͸®
Àι°|Àü±â|ÆòÀü
ÀÇÇÐ|°Ç°­|´ÙÀ̾îÆ®
Á¤º¸|À¯¸ð¾î|ÄûÁî
¿¬±Ø|¿µÈ­|¿¬¿¹|¹æ¼Û
¾ð·Ð|¹Ìµð¾î|±¤°í
½É¸®ÇÐ|±³À°ÇÐ
¾îÇÐ|¿Ü±¹¾î|ÇÑÀÚ
°úÇÐ|¼öÇÐ|ÀÌ°øÇÐ
¿©¼ºÇÐ|Æä¹Ì´ÏÁò|¹Ì¿ë
°¡Á¤|»ýÈ°|¿ä¸®
¹®È­·Ð|¿©Çà|Áö¿ªÇÐ
¿ªÇÐ|Á¡¼º|ºÒ°¡»çÀÇ
Ãë¹Ì|·¹Àú|½ºÆ÷Ã÷
³í¼³¹®|Æò·ÐÁý|Ä®·³
½Å¹®|ÀâÁö|°£Ç๰
¹Ì·¡ÇÐ|µµ½ÃÇÐ|ȯ°æ
Àι®|±³¾ç
ÄÄÇ»ÅÍ|ÀÎÅͳÝ
¼öÇè¼­|Ãë¾÷|ÀÚ°ÝÁõ
¹ý|¹ý·ü
»çÀü|¹é°ú»çÀü
ÀüÁý|³í¹®
°ÇÃà|ÀÎÅ׸®¾î
ÆмÇ
¹Ì¼ú|¿¹¼ú|´ëÁß¹®È­
À½¹Ý|¿µ»ó|ºñµð¿À|DVD
»çÁø|ºñµð¿À
À½¾Ç
¸¸È­
ÃʵîÇб³ Àü°ú|¹®Á¦Áý
ÁßÇб³Âü°í¼­|¹®Á¦Áý
°íµîÇб³Âü°í¼­|¹®Á¦Áý
±³°ú¼­
¿ø¼­
°í°´»óÇ°°áÁ¦
¿Â¶óÀÎ °ßÀû¼­
 
Ä¿¹Â´ÏƼ
Áú¹®°ú ´ë´ä
Ã¥À» Æļ¼¿ä
µµ¼­Q&A
ÀÌ¿ë¾È³»
ÀÚ·á½Ç
»ç¿ëÈı⠸ðÀ½
 
ÀüÈ­¹®ÀÇ
     
 : 031-878-5720

 E-mail ¹®ÀÇ
 
 
 
  ÀԱݰèÁ¾ȳ»
¿¹±ÝÁÖ ³²µ¿ÀÏ

½ÅÇÑ 553-01-008750
³óÇù 010-12-132471
±¹¹Î 801-21-0764-973
±â¾÷ 055-052285-02-012
¿ì¸® 569-265982-02-001
Çϳª 773-910004-75205
SCÁ¦ÀÏ 641-20-292693
¾¾Æ¼ 170-10314-264
¿ìü±¹ 103861-02-180905
Ä«Ä«¿À¹ðÅ© 3333132817438
 
 
 
 
 
1 2020³â Ãß¼®¿¬ÈÄ ¹è¼Û¾È³»
 
 
2 2019³â ¼³¿¬ÈÞ ¹è¼Û¾È³»
 
 
3 2018³â Ãß¼®¿¬ÈÞ ¹è¼Û¾È³»
 
 
4 2017³â ¼³¿¬ÈÞ ¹è¼Û¾È³»
 
 
5 2016³â Ãß¼®¿¬ÈÞ ¹è¼Û¾È³»
 
ºñ¹Ð¹øÈ£ È®ÀÎ ´Ý±â
ÄÄÇ»ÅÍ|ÀÎÅÍ³Ý > ÀÎÅͳÝ/³×Æ®¿öÅ© > [¿ø¼­] Computer Networking: A Top-Down Approach: International Edition - fourth edition Kurose, James F.; Ross, Keith W. ÁöÀ½ Pearson
ÄÄÇ»ÅÍ|ÀÎÅͳÝ


[¿ø¼­] Computer Networking: A Top-Down Approach: International Edition - fourth edition Kurose, James F.; Ross, Keith W. ÁöÀ½ Pearson [Áß]
ÆǸŰ¡°Ý : 8,000¿ø
Àû¸³±Ý¾× : 80¿ø
Á¦Á¶È¸»ç : Pearson
¸ðµ¨¸í : 9780321513250
[192] 2008
¼ö·® EA
 
   

 
»óÇ° »ó¼¼ ¼³¸í
 
 
878ÆäÀÌÁö Building on the successful top-down approach of previous editions, the Fourth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross bring the issues of network security to the forefront and integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors–and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.
 
[¹è¼Û·á]
±âº»¹è¼Û·á 2,500¿ø 5¸¸¿øÀÌ»ó ¹è¼Û·á¹«·á

[¹æ¹®±¸¸Å]
¼îÇθô»óÀÇ µµ¼­´Â ¸ÅÀå¿¡ Àç°í°¡ ¾ø°í ¾çÁÖµµ¼­Ã¢°í¿¡ ÀÖ´Â °æ¿ì°¡ ¸¹ÀÌ ÀÖ½À´Ï´Ù.
¼îÇθôµµ¼­¸¦ Á÷Á¢ ¸ÅÀåÀ¸·Î ¹æ¹®±¸¸ÅÇÏ½Ã°í ½ÍÀ¸½Ç¶§¿¡´Â ¹æ¹®ÇÏ·çÀü ¹Ì¸® ¿¬¶ôÀ» ÁÖ¼Å¾ß ¸ÅÀå¿¡ µµ¼­Áغñ°¡ °¡´ÉÇÕ´Ï´Ù
»óÅ°¡ ÁÁÀº µµ¼­¸¦ À§ÁÖ·Î Ãë±ÞÇÏ·Á°í ³ë·ÂÇÏ°í ÀÖÀ¸³ª Áß°íµµ¼­ÀÇ Æ¯¼º»ó °³ÀÎÀÇ °üÁ¡Â÷°¡ ÀÖ°í °í°´´Ô¿¡µû¶ó »õÃ¥°ú ´Þ¸® µµ¼­ÀÇ »óÅ°¡ ¶³¾îÁö°Å³ª ³ª»Ú°Ô »ý°¢µÇ¾îÁö´Â °æ¿ì°¡ °£È¤ÀÖ½À´Ï´Ù. µµ¼­ÀÇ »óŸ¦ [»ó][Áß][ÇÏ]·Î Ç¥½ÃÇÏ¿´°í ƯÀÌ»çÇ×Àº ¼³¸íÀ» ÷ºÎÇÏ°í ÀÖÀ¸´Ï ÁÖ¹®Àü¿¡ »óŸ¦ ²À È®ÀÎÇÏ¿© ÁÖ¼¼¿ä.
ÀÚ¼¼ÇÑ µµ¼­ÀÇ Á¤º¸°¡ ±Ã±ÝÇϽŠ°æ¿ì¿¡´Â ¾Æ·¡ Á¦Ç°Q&A¸¦ ÀÌ¿ëÇÏ¿©ÁÖ¼¼¿ä
 
 
 
 
»óÇ° »ç¿ë Èıâ
 
 
À̸§ :
³»¿ë :
ÆòÁ¡
 
 
 
 
»óÇ° QNA
 
»óÇ°¿¡ ´ëÇØ ±Ã±ÝÇÑ Á¡À» ÇØ°áÇØ µå¸³´Ï´Ù.
¹øÈ£ Á¦¸ñ ÀÛ¼ºÀÚ ÀÛ¼ºÀÏ Á¶È¸
 
 
ȸ»ç¼Ò°³ | ÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸Ã³¸®¹æħ | ÀÌ¿ë¾È³»
»óÈ£ : °í·¡¼­Á¡ | ´ëÇ¥ÀÚ(¼º¸í):³²µ¿ÀÏ l °³ÀÎÁ¤º¸ º¸È£ Ã¥ÀÓÀÚ : ³²µ¿ÀÏ
»ç¾÷ÀÚ µî·Ï¹øÈ£ ¾È³» 106-04-73454 106-04-73454 | Åë½ÅÆǸž÷ ½Å°í¹øÈ£ : 2016-°æ±â¾çÁÖ-0001
ÁÖ¼Ò: [¹°·ù¼¾ÅÍ]°æ±âµµ ¾çÁֽà ¹é¼®À¾ º¹Áö¸® 426-8 /[¿Â¶óÀμ¾ÅÍ]°æ±âµµ ¾çÁֽà ¹é¼®À¾ È£¸í·Î 87 | ÀüÈ­ : 031-878-5720
Contact ¸ÞÀÏ for more information. Copyright ¨Ï 2007 °í·¡¼­Á¡ All rights reserved.