±¹³»µµ¼
Àڰݼ/¼öÇè¼
°ø¹«¿ø/°í½Ã
7.9±Þ±â¼úÁ÷
9±Þ 7±Þ Àü»êÁ÷ °ø¹«¿ø ½ÃÇè´ëºñ
Á¤°¡ |
37,000¿ø |
---|
33,300¿ø (10%ÇÒÀÎ)
1,850P (5%Àû¸³)
ÇÒÀÎÇýÅÃ | |
---|---|
Àû¸³ÇýÅà |
|
|
|
Ãß°¡ÇýÅÃ |
|
À̺¥Æ®/±âȹÀü
¿¬°üµµ¼(15)
»óÇ°±Ç
ÀÌ»óÇ°ÀÇ ºÐ·ù
Ã¥¼Ò°³
Á¤º¸º¸¾È ºÐ¾ß´Â ¹üÀ§°¡ ³Ð°í ³»¿ëÀÌ ¾î·Á¿ö ºñÀü°øÀڵ鿡°Ô´Â Á¢±ÙÇϱâ Èûµç °ú¸ñÀÔ´Ï´Ù. ¶ÇÇÑ ´Ü¼ø ¾Ï±â·Î´Â ´Ù¾çÇÑ ÀÀ¿ë¹®Á¦¸¦ Ç® ¼ö ¾ø¾î ÀÔ¹®ÀÚµéÀ» ¸Á¼³ÀÌ°Ô ÇÕ´Ï´Ù. ÀÌ Ã¥Àº º¸¾ÈÀ» óÀ½ ½ÃÀÛÇÏ´Â ¼öÇè»ýÀ» À§ÇØ ³×Æ®¿öÅ©¿¡ ´ëÇÑ ÀÌÇظ¦ ¹ÙÅÁÀ¸·Î ±âÃʺÎÅÍ ÀÀ¿ë±îÁö ÇнÀÇÒ ¼ö ÀÖµµ·Ï ±¸¼ºÇß½À´Ï´Ù.
ÃâÆÇ»ç ¼Æò
1. º» µµ¼¿¡´Â ¼öÇèÀÚÀÇ È¿À²ÀûÀÎ ÇнÀÀ» À§ÇØ Àú°¡°¡ Á÷Á¢ °ÀÇÇÏ´Â ¹«·á µ¿¿µ»óÀÌ Á¦°øµË´Ï´Ù.
2. ÇнÀ È¿À²À» ³ôÀ̱â À§ÇØ °ø¹«¿ø ½ÃÇè°ú Á¤º¸º¸¾È±â»ç¿¡ ÃâÁ¦µÈ ³»¿ëÀº »öÀ» ±¸ºÐÇØ Ç¥½ÃÇÏ¿´½À´Ï´Ù. »ö»óÀ¸·Î ±¸ºÐÇÑ ºÎºÐÀº ¹Ýµå½Ã ÇнÀÇϱ⠹ٶø´Ï´Ù.
3. º» µµ¼ ¿Ü¿¡ º°µµ·Î Ãâ°£µÈ ¡¸±âÃâ¹®Á¦Áý¡¹À» ÇÔ²² °øºÎÇÏ¸é ´õ È¿À²ÀûÀ¸·Î ½ÃÇè¿¡ ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù. ¡¸Á¤º¸º¸È£·Ð¡¹°ú ¡¸Á¤º¸º¸¾È±â»ç¡¹ ÃֽŠ±âÃâ¹®Á¦¸¦ ÀÌ Ã¥ÀÇ ¸ñÂ÷¿Í ÀÏÄ¡Çϵµ·Ï ¼ø¼¸¦ Á¤¸®Çß½À´Ï´Ù. ±âÃâ¹®Á¦¸¦ Ç®¸é¼ ÀÌ Ã¥À» ÅëÇØ °³³äÀ» È®ÀÎÇØ °£´Ù¸é º¯ÇüµÈ ¹®Á¦¸¦ Ǫ´Â µ¥ Å« ÈûÀÌ µÉ °ÍÀÔ´Ï´Ù.
¸ñÂ÷
Part 01 Á¤º¸º¸È£ ÀϹÝ
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2019 ³â ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
2019³â ±¹°¡Á÷ 9±Þ ³×Æ®¿öÅ© º¸¾È
2019³â ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2019³â ¼¿ï½Ã 9±Þ Á¤º¸º¸È£·Ð
2019³â Áö¹æÁ÷ 9±Þ Á¤º¸º¸È£·Ð
°ü·ÃÀ̹ÌÁö
ÁÖ°£·©Å·
´õº¸±â»óÇ°Á¤º¸Á¦°ø°í½Ã
À̺¥Æ® ±âȹÀü
ÀÌ »óÇ°ÀÇ ½Ã¸®Áî
(ÃÑ 17±Ç / ÇöÀ籸¸Å °¡´Éµµ¼ 14±Ç)
Àڰݼ/¼öÇè¼ ºÐ¾ß¿¡¼ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥
ÆǸÅÀÚÁ¤º¸
»óÈ£ |
(ÁÖ)±³º¸¹®°í |
---|---|
´ëÇ¥ÀÚ¸í |
¾Èº´Çö |
»ç¾÷ÀÚµî·Ï¹øÈ£ |
102-81-11670 |
¿¬¶ôó |
1544-1900 |
ÀüÀÚ¿ìÆíÁÖ¼Ò |
callcenter@kyobobook.co.kr |
Åë½ÅÆǸž÷½Å°í¹øÈ£ |
01-0653 |
¿µ¾÷¼ÒÀçÁö |
¼¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù) |
±³È¯/ȯºÒ
¹ÝÇ°/±³È¯ ¹æ¹ý |
¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼ ½Åû °¡´É |
---|---|
¹ÝÇ°/±³È¯°¡´É ±â°£ |
º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É |
¹ÝÇ°/±³È¯ ºñ¿ë |
º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯ |
·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì |
»óÇ° Ç°Àý |
°ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½ |
¼ÒºñÀÚ ÇÇÇغ¸»ó |
·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© ó¸®µÊ ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀǼҺñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ |
(ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
(ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.
¹è¼Û¾È³»
±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
Ãâ°í°¡´É ½Ã°£ÀÌ ¼·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.
±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.
¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.