ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡

  ¢Æ   [º¸µå°ü¸®¼³Á¤]-[4-15]¿¡¼­ ÁöÁ¤   ¢Æ  

À̸§: ±èÁøÅÃ
2002/9/21(Åä)
¿Â¶óÀÎ ¼­Àû ºÐ¾ßº° ÃÑÁýÇÕ  
»õ ÆäÀÌÁö 1

¿Â¶óÀÎ ¼­Àû
¸µÅ©À̱⠶§¹®¿¡ ´ç¿¬È÷ ©¸°°ÍÀÌ ÀÖÀ» °ÍÀÔ´Ï´Ù.
¾çÇØ ¹Ù¶ø´Ï´Ù.

C for beginners
Web Programming with Java
The Art of Assembly
Developing Utilities in Assmbly Language
Using HTML 4
Using Visual Basic 6
VBScript Unleashed

Perl
Perl 5 by Example
Perl CGI for WinNT
Perl for Web (by David Harlan)
Perl for Web (by Paul Doyle)
Special Edition Using Perl 5 for Web Programming
Web Client Programming with Perl

C++
C++ Annotation Version 4.4.2
ANSI/ISO C++ Professional Programmer's Handbook
Teach yourself C++ in 21 days 2nd Edition
Data Structures and Algorithms with Object-Oriented Design Patterns in C++
Optimizing C++ the www version
Fast track visual c++ 6.0_programming
Learn ActiveX Template Library Development with Visual C++ 6.0
Evolving a C++ Design
Language Translation Using PCCTS & C++
Compilers and Compiler Generators: An Introduction with C++

Programming in C
Introduction to Programming Languages
Foundations of Computer Science
C for Beginners
Programming in C: UNIX System Calls and Subroutines using C
Crash Course in C++ for C Programmers
Organization of the C Language Reference
C Element of Style

Java
Teach Yourself Java in 21 Days
Tricks of Java Programming Gurus
Thinking In Java, by Bruce Eckel, 2nd Edition
Java 2 In Record Time
Objects and Java
Enterprise JavaBeans
Servlet Essentials
Securing Java
Developing Java Enterprise Applications
Concurrent Programming Using Java
Interface Design: Best Practices in Object-Oriented API Design in Java
A Java GUI Programmer's Primer
Java in a Nutshell, 2nd Edition
Presenting JavaBeans
Essentials of the Java Programming, Part 2
The Java Language Environment
Java by Examples
Inside Java
Hacking Java: The Java Professional's Resource Kit

Assembly
The Art of Assembly
Introduction to Socket Programming
Intel Architecture System Programming Guide, Addendum
Intel overview of the protected mode operations

CGI
Teach Yourself CGI Programming With Perl in a Week
CGI Programming on the World Wide Web
CGI Manual of Style
CGI Developers Guide

Other
Build your own pc!
Upgrading and Repairing PC's
Teach Yourself Windows 98 in 24 Hours
Building an Intranet with Windows NT 4
Practical UNIX & Internet Security
Introduction to Unix
Inside Windows 98
Teach Yourself ActiveX in 21 Days
Network Programming
A First Guide to PostScript
PHP HOW-TO
Advanced Python and COM
The Complete Idiot's Guide to Creating an HTML Web Page
HTML Style Sheets Quick Reference
Web Publishing with HTML

Rainbow Books
Amber - A Guide To Understanding Configuration Management In Trusted Systems
Blue - Trusted Product Evaluation Questionnaire
Bright Blue - Trusted Product Evaluation - A Guide for Vendors
Brown - Guide To Understanding Trusted Facility Management
Burgundy - A Guide to Understandning Design Documentation in Trusted Systems
Dark Lavender - A Guide to Understanding Trusted Distribution in Trusted Systems
Forest Green - A Guide to Understanding Data Remanence in Automated Information Systems
Green - Department of Defense Password Management Guideline
Hot Peach - A Guide to Writing the Security Features User's Guide for Trusted Systems
Light Blue - A Guide to Understanding Identification and Authentication in Trusted Systems
Light Pink - A Guide to Understanding Covert Channel Analysis of Trusted Systems
Orange - Department of Defense Trusted Computer System Evaluation Criteria
Neon Orange - A Guide to Understanding Discrentionary Access Control in Trusted Systems
Pink - Rating Maintenance Phase Program Document Version 2
Guidelines for Formal Verification Systems
Red - Trusted Network Interpretation Environment Guideline
Silver - Trusted UNIX Working Group (TRUSIX) Rationable for Selecting Access Control List Features for the UNIX (r)

Unix
Linux Device Drivers, 2nd Edition
Linux Network Administrator's Guide, 2nd Ed
UNIX in a Nutshell: System V Edition
Teach Yourself Samba in 24 Hours
Practical UNIX & Internet Security
Sed and Awk, 2nd Edition
Debian Linux User's Guide, 2nd Edition
GTK+ Reference Manual
UNIX Socket FAQ
Slackware Unleashed
Learning the Korn Shell in 21 Days
Unix Unleashed, System Administrators Edition

Windows
Windows 2000 New Features and Architecture
Windows 2000 The Active Directory
Windows 2000 Active Directory and Design - Fundamentals
Windows 2000 Active Directory and Design - Domain Plan and Implement
Windows 2000 Basic Administration - Users
Windows 2000 Basic Administration - Events and Audit
Windows 2000 Basic Administration - Storage and Print
Windows 2000 Basic Administration - Shared Folders
Windows 2000 Configuration
Windows 2000 Group Policy and Term Service
Windows 2000 Update - Active Directory
The Registry Help Book
Using Microsoft Visual InterDev
Using VBScript
Microsoft Frontpage 97
Teach Yourself Windows 98 in 24 Hours
Using JScript
Windows NT 4 Web Development

Networking
Zen and the Art of the Internet
Understanding Networking Technologies
Practical UNIX & Internet Security
DNS And BIND
Computer Networking A Top-Down Approach Featuring the Internet
Introduction to the Internet Protocols
The Hack Kit
Teach Yourself TCP/IP in 14 Days
TCP/IP Illustrated,Volume 1
Apache1.3 User's Guide
SCO Unix Networking Guide
Building an Intranet with Windows NT 4
Open Distributed Systems
Client/Server Computing
Internetworking Design Guide
Managing Multivendor Networks
¡¡

  À̸§   ¸ÞÀÏ   °ü¸®ÀÚ±ÇÇÑÀÓ
  ³»¿ë ÀÔ·Ââ Å©°Ô
                    ´äº¯/°ü·Ã ¾²±â Æû¸ÞÀÏ ¹ß¼Û ¼öÁ¤/»èÁ¦     ÀÌÀü±Û ´ÙÀ½±Û    
¹øÈ£Á¦ ¸ñÀ̸§Ã·ºÎÁ¶È¸
21   À©µµ¿ì¿¡¼­ ¹öÆÛ¿À¹öÇ÷οì ÄÚµå ¸¸µé±â(¿µ¹®) DilDog    84829
20   Formatting(¿µ¹®) MooreR    2460
19   ¿Â¶óÀÎ ¼­Àû ºÐ¾ßº° ÃÑÁýÇÕ ±èÁøÅà    31510
18   ¸ðµç ¿ø¼­´Â ÀÌ°÷¿¡ FgOsT    43014
17   Àü¼¼°èÀÇ ¸ðµç ÆÄÀÏÇü½Äµé (ÆÄÀÏ È®ÀåÀÚ ¸ñ·Ï) ±èÁøÅà    20243
16   ÃÖ»óÀÇ º¸¾ÈÀ¯Áö¹ý - ¿µ¹® FgOsT     15503
15   ÀÎÆ®¶ó³Ý unleashed - ¿µ¹® FgOsT     10065
14   High-Performance Networking Unleashed - ¿µ¹® FgOsT     5994
13   Firewalls Complete - ¿ø¼­ FgOsT     5208
12   cisco router handbook - ¿ø¼­ ±èÁøÅà     5270