• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3090713]
• Literatura piękna
 [1812092]
• Turystyka
 [52353]
• Informatyka
 [156406]
• Komiksy
 [36497]
• Encyklopedie
 [23076]
• Dziecięca
 [611051]
• Hobby
 [103270]
• AudioBooki
 [1744]
• Literatura faktu
 [194823]
• Muzyka CD
 [382]
• Słowniki
 [2994]
• Inne
 [446649]
• Kalendarze
 [242]
• Podręczniki
 [166396]
• Poradniki
 [420635]
• Religia
 [508575]
• Czasopisma
 [545]
• Sport
 [61132]
• Sztuka
 [249371]
• CD, DVD, Video
 [3442]
• Technologie
 [230899]
• Zdrowie
 [98302]
• Książkowe Klimaty
 [126]
• Zabawki
 [2532]
• Puzzle, gry
 [4027]
• Literatura w języku ukraińskim
 [273]
• Art. papiernicze i szkolne
 [8376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5132

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Implementing the ISO/IEC 27001 Information Security Management System Standard Edward Humphreys 9781596931725 Artech House Publishers
Implementing the ISO/IEC 27001 Information Security Management System Standard

ISBN: 9781596931725 / Angielski / Twarda / 2007 / 286 str.

ISBN: 9781596931725/Angielski/Twarda/2007/286 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward Humphreys
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
cena: 438,01

Cisco PIX Firewalls: Configure / Manage / Troubleshoot Umer Khan 9781597490047 Syngress Media,U.S.
Cisco PIX Firewalls: Configure / Manage / Troubleshoot

ISBN: 9781597490047 / Angielski / Miękka / 2005 / 576 str.

ISBN: 9781597490047/Angielski/Miękka/2005/576 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Umer Khan
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.

  • The Cisco Pix firewall is the #1 market leading...
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
cena: 304,36

Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals James C. Foster Mike Price Stuart McClure 9781597490054 Syngress Publishing
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

ISBN: 9781597490054 / Angielski / Miękka / 2005 / 667 str.

ISBN: 9781597490054/Angielski/Miękka/2005/667 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James C. Foster; Mike Price; Stuart McClure
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1....

cena: 196,26

Perfect Password: Selection, Protection, Authentication Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security) 9781597490412 Syngress Media,U.S.
Perfect Password: Selection, Protection, Authentication

ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str.

ISBN: 9781597490412/Angielski/Miękka/2005/182 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
and writer consultant Mark Burnett (Independent researcher
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
cena: 157,91

Security Log Management: Identifying Patterns in the Chaos Jacob Babbin (Contractor with a government agency filling the role of Intrusion Detection Team Lead) 9781597490429 Syngress Media,U.S.
Security Log Management: Identifying Patterns in the Chaos

ISBN: 9781597490429 / Angielski / Miękka / 2006 / 350 str.

ISBN: 9781597490429/Angielski/Miękka/2006/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jacob Babbin (Contractor with a government agency filling th
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
cena: 304,36

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole, Sandra Ring 9781597490481 Syngress Media,U.S.
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

ISBN: 9781597490481 / Angielski / Miękka / 2006 / 350 str.

ISBN: 9781597490481/Angielski/Miękka/2006/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Cole;Sandra Ring
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today.

This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
cena: 217,58

Syngress Force Emerging Threat Analysis: From Mischief to Malicious Robert Graham (Chief Scientist of Internet Security Systems, Inc) 9781597490566 Syngress Media,U.S.
Syngress Force Emerging Threat Analysis: From Mischief to Malicious

ISBN: 9781597490566 / Angielski / Miękka / 2006 / 500 str.

ISBN: 9781597490566/Angielski/Miękka/2006/500 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Robert Graham (Chief Scientist of Internet Security Systems
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today

This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..

* From Practical VoIP Security, Thomas Porter, Ph.D. and...

A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterp...

cena: 304,36

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Paul Piccard (Director of Threat Research for Webroot, USA) 9781597490641 Syngress Media,U.S.
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat

ISBN: 9781597490641 / Angielski / Miękka / 2006 / 448 str.

ISBN: 9781597490641/Angielski/Miękka/2006/448 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) Paul Piccard (Director of Threat Research for Webroot
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
cena: 304,36

Firewall Policies and VPN Configurations Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh (Security Researcher on the Microsoft Malware Protectio 9781597490887 Syngress Media,U.S.
Firewall Policies and VPN Configurations

ISBN: 9781597490887 / Angielski / Miękka / 2006 / 550 str.

ISBN: 9781597490887/Angielski/Miękka/2006/550 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Syngress;Dale Liu;Stephanie Miller
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
cena: 304,36

Cryptography for Developers Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) 9781597491044 Syngress Media,U.S.
Cryptography for Developers

ISBN: 9781597491044 / Angielski / Miękka / 2006 / 400 str.

ISBN: 9781597491044/Angielski/Miękka/2006/400 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tom St Denis (senior software developer and cryptographer fo
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers b...

cena: 369,45

How to Cheat at Managing Information Security Mark Osborne (Cheif Information Security Officer at Interoute) 9781597491105 Syngress Media,U.S.
How to Cheat at Managing Information Security

ISBN: 9781597491105 / Angielski / Miękka / 2006 / 352 str.

ISBN: 9781597491105/Angielski/Miękka/2006/352 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Osborne (Cheif Information Security Officer at Interout
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.

These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
cena: 250,12

WarDriving and Wireless Penetration Testing Chris Hurley (Senior Penetration Tester, Washington, DC, USA), Russ Rogers, Frank Thornton (Owner, Blackthorn Systems, N 9781597491112 Syngress Media,U.S.
WarDriving and Wireless Penetration Testing

ISBN: 9781597491112 / Angielski / Miękka / 2007 / 446 str.

ISBN: 9781597491112/Angielski/Miękka/2007/446 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA DC Washington Chris Hurley (Senior Penetration Tester;Russ Rogers; US New Hampshire Blackthorn Systems Frank Thornton (Owner
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
cena: 288,09

Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures Brian T Contos (CISSP, Chief Security Officer, ArcSight Inc.) 9781597491297 Syngress Media,U.S.
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

ISBN: 9781597491297 / Angielski / Miękka / 2007 / 304 str.

ISBN: 9781597491297/Angielski/Miękka/2007/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
ArcSight Inc. Chief Security Officer Brian T Contos (CISSP
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.

Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
cena: 304,36

Botnets: The Killer Web Applications Craig Schiller (CISO for Portland State University and President of Hawkeye Security Training, LLC), James R. Binkley (T 9781597491358 Syngress Media,U.S.
Botnets: The Killer Web Applications

ISBN: 9781597491358 / Angielski / Miękka / 2007 / 480 str.

ISBN: 9781597491358/Angielski/Miękka/2007/480 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Craig Schiller (CISO for Portland State University and Presi; and researcher network engineer James R. Binkley (Teacher;Anthony Bradley
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
cena: 304,36

XSS Attacks: Cross Site Scripting Exploits and Defense Seth Fogie (Vice President, Airscanner, Dallas, TX, USA), Jeremiah Grossman (Founder and CTO, WhiteHat Security, Santa C 9781597491549 Syngress Media,U.S.
XSS Attacks: Cross Site Scripting Exploits and Defense

ISBN: 9781597491549 / Angielski / Miękka / 2007 / 480 str.

ISBN: 9781597491549/Angielski/Miękka/2007/480 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) TX Dallas Airscanner Seth Fogie (Vice President; Santa WhiteHat Security Jeremiah Grossman (Founder and CTO;Robert Hansen (Founder of the Hackers.org Web Application Se
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.

XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
cena: 369,45

Alternate Data Storage Forensics Amber Schroader (CEO, Paraben Corporation, Dallas, TX, USA), Tyler Cohen ((CISSP) Computer Science Corporation & Researc 9781597491631 Syngress Media,U.S.
Alternate Data Storage Forensics

ISBN: 9781597491631 / Angielski / Miękka / 2007 / 400 str.

ISBN: 9781597491631/Angielski/Miękka/2007/400 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) TX Dallas Paraben Corporation Amber Schroader (CEO;Tyler Cohen ((CISSP) Computer Science Corporation & Research
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of...
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
cena: 369,45

AVIEN Malware Defense Guide for the Enterprise David Harley (Formerly UK's National Health Service, National Infrastructure Security Manager, Independent author and co 9781597491648 Syngress Media,U.S.
AVIEN Malware Defense Guide for the Enterprise

ISBN: 9781597491648 / Angielski / Miękka / 2007 / 656 str.

ISBN: 9781597491648/Angielski/Miękka/2007/656 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nationa David Harley (Formerly UK's National Health Service;Robert S. Vibert;Ken Bechtel
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about...

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on ...
cena: 369,45

Zen and the Art of Information Security Ira Winkler ((CISSP), President, Internet Security Advisors Group; author of Spies Among Us) 9781597491686 Syngress Media,U.S.
Zen and the Art of Information Security

ISBN: 9781597491686 / Angielski / Miękka / 2007 / 192 str.

ISBN: 9781597491686/Angielski/Miękka/2007/192 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Internet Security Advisors President Ira Winkler ((CISSP)
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security underst...
cena: 190,46

How to Cheat at VoIP Security Thomas Porter, CISSP, CCNP, CCDA, CCS (Director of IT Security, FIFA 2006 World Cup), Michael Gough (Computer security c 9781597491693 Syngress Media,U.S.
How to Cheat at VoIP Security

ISBN: 9781597491693 / Angielski / Miękka / 2007 / 432 str.

ISBN: 9781597491693/Angielski/Miękka/2007/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
CCS (Director of IT Securi CCDA CCNP CISSP Thomas Porter; host and webmas Michael Gough (Computer security consultant
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
* VoIP Isn't Just Another Data Protocol
IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different....
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect in...
cena: 304,36

How to Cheat at Configuring Open Source Security Tools Michael Gregg (President, Superior Solutions, Inc.), Eric S. Seagren (Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase),  9781597491709 Syngress Media,U.S.
How to Cheat at Configuring Open Source Security Tools

ISBN: 9781597491709 / Angielski / Miękka / 2007 / 528 str.

ISBN: 9781597491709/Angielski/Miękka/2007/528 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Inc.) Superior Solutions Michael Gregg (President; JPMorganC ISSAP CISA CISSP Eric S. Seagren (Eric Seagren; D.C. Senior Scientist in the Ad Angela Orebaugh (Washington
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that...

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perf...
cena: 304,36

Podprzednia  10  11  12  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia