´_¿³°Ó¤uWebOPAC ½u¤W¤½¥Î¥Ø¿ý¬d¸ß
¬d¸ßµ²ªG¦Cªí
®Ñ ¦W¡GWeb2.0Àb«È§Þ³N´¦±K/ÄÁ±á»ï,®}¤Ö°ö½sµÛ
§@ ªÌ¡GÄÁ±á»ï½sµÛ
¦XµÛ§@ªÌ¡G®}¤Ö°ö½sµÛ
¥X ª© ¶µ¡G»O¥_¥«¡GªQ±^¸ê²£ºÞ²z 2013
½] ®Ö ¶µ¡G382­±¡G¹Ï,ªí¡F23*17¤½¤À
¢×¢á¢Ð¢Ü¡G9789572242032(¥­¸Ë)¡G·s¥x¹ô450¤¸
¼Ð ÃD ¶µ¡G¸ê°T¦w¥þ
¼Ð ÃD ¶µ¡G¹q¸£ºô¸ô

³sµ²¬d¸ß Åv«Â¼Ð¥Ø
®Ñ¦W web2.0Àb«È§Þ³N´¦±K
§@ªÌ ÄÁ±á»ï ¡E®}¤Ö°ö
¥Xª©¶µ ªQ±^¸ê²£ºÞ²z
ÂO®Ñ¶µ
¼ÐÃD¶µ ¸ê°T¦w¥þ ¡E¹q¸£ºô¸ô
¤ÀÃþ¸¹ 312.76
§ù«Â¤ÀÃþªk
ISBN 9789572242032
¶W³sµ²

Web2.0Àb«È§Þ³N´¦±K/ÄÁ±á»ï,®}¤Ö°ö½sµÛ.--»O¥_¥«¡GªQ±^¸ê²£ºÞ²z2013
¥H¤U¬°¥»À]À]ÂÃ
µù°O À]§O/À]Âæa µn¿ý¸¹ ¤ÀÃþ¸¹/§@ªÌ¸¹ ¹Ï®Ñª¬ªp
´_¿³°Ó¤u¹Ï®ÑÀ]/(¥¼°O¿ý) 023742 312.76/8764 ¦bÀ]¤¤

±z¥i¯à¹ï¤U¦C®Ñ¥Ø¤]·|¦³¿³½ì¡K
ºû°ò¸Ñ±K=WikiLeaks¡G§A¤£ª¾¹Dªº¨Æ¹ê¯u¬Û/Ĭ¨¥,¶PÃxµÛ.--­×­qªìª© .--»O¥_¥«¡G¤j³£·|
¯}¸Ñ½w½Ä°Ï·¸¦ìº|¬}»P§ðÀ»§Þ³N/Àb«È¨¾½u½s¿è³¡½sµÛ .--»O¥_¥«¡G¨Î»í¸ê°T2013.02
¹Ï¸Ñ­Ó¤H¸ê®Æ«OÅ@ªk¡GºûÅ@Åv¯qªº²Ä¤@¥»®Ñ/¿ú¥@³ÇµÛ .--²Ä¤@ª© .--»O¤¤¥«¡G¤Q¤O¤å¤Æ
ºô¸ô§Þ³N¤Jªù3¤ÀÄÁ¶W¹Ï¸ÑÁ¿®y/ºô³¥½Ã¤GµÛ ;¶ÀÞ³´@Ķ .--»O¥_¥«¡GºX¼Ð2009[¥Á98]
Àb«È¥ô°È¤§µØ¤s½×¤ì°¨Design of combination trojan and antihacking/µ{ªÃ½÷, John Hawke¦XµÛ.--ªìª© .--»O¥_¥«¡GùÖ®p¸ê°T2009.04
Àb«È§ð¨¾§Þ³N·s¾Ý»O .±b¤á±K½X»P¾÷±KÀÉ®×½g/µ{ªÃ½÷, John Hawke§@.--»O¥_¥«¡GºX¼Ð2010[¥Á99]

¹Ï®Ñ¬d¸ß | ­É¾\¬d¸ß | À]Â÷§ªp | ·s®Ñ³q§i | ¹Ï®Ñ±Æ¦æ | ­Ó¤H±Æ¦æ | ŪªÌ·N¨£ | ŪªÌ¤¶ÁÊ | ºô¸ô¸ê·½ | ¹Ï®ÑÀ]³W³¹ | ¤p½×¤å | ¾\Ū¤ß±o¼g§@ | ¨Ï¥Î»¡©ú |
Host by each Customer, Power by Vice Co.
­º­¶¹Ï®ÑÀ]­º­¶ºô¯¸ºÞ²z All Rights Reserved.
IP: 18.227.0.249