• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3051

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Similarity and Compatibility in Fuzzy Set Theory: Assessment and Applications Valerie V. Cross, Thomas A. Sudkamp 9783790825077 Springer-Verlag Berlin and Heidelberg GmbH &
Similarity and Compatibility in Fuzzy Set Theory: Assessment and Applications

ISBN: 9783790825077 / Angielski / Miękka / 209 str.

ISBN: 9783790825077/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Valerie V. Cross;Thomas A. Sudkamp
Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reasoning and consequently is critical in the development of automated diagnosis, classification, information retrieval and decision systems. The assessment of similarity has played an important role in such diverse disciplines such as taxonomy, psychology, and the social sciences. Each discipline has proposed methods for quantifying similarity judgments suitable for its particular applications. This book presents a unified approach to quantifying...
Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reason...
cena: 402,53

 Advanced Fuzzy Systems Design and Applications Yaochu Jin 9783790825206 Not Avail
Advanced Fuzzy Systems Design and Applications

ISBN: 9783790825206 / Angielski / Miękka / 272 str.

ISBN: 9783790825206/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yaochu Jin
Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from human expert knowledge or human heuristics for relatively simple systems. In the last few years, data-driven fuzzy rule generation has been very active. Compared to heuristic fuzzy rules, fuzzy rules generated from data are able to extract more profound knowledge for more complex systems. This book presents a number of approaches to the generation of fuzzy rules from data, ranging from the direct fuzzy inference based to neural net- works and...
Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from hum...
cena: 402,53

 State-of-the-Art in Content-Based Image and Video Retrieval Remco C. Veltkamp, Hans Burkhardt, Hans-Peter Kriegel 9789048158638 Springer
State-of-the-Art in Content-Based Image and Video Retrieval

ISBN: 9789048158638 / Angielski / Miękka / 345 str.

ISBN: 9789048158638/Angielski/Miękka/345 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Remco C. Veltkamp;Hans Burkhardt;Hans-Peter Kriegel
Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in entertainment, business, art, engineering, and science. Such applications often involved large image and video collections, and therefore, searching for images and video in large collections is becoming an important operation. Because of the size of such databases, efficiency is crucial. We strongly believe that image and video retrieval need an integrated approach from fields such as image processing, shape processing, perception, database...
Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in...
cena: 402,53

 Personalized Digital Television: Targeting Programs to Individual Viewers Liliana Ardissono, Alfred Kobsa, Mark T. Maybury 9789048166046 Springer
Personalized Digital Television: Targeting Programs to Individual Viewers

ISBN: 9789048166046 / Angielski / Miękka / 321 str.

ISBN: 9789048166046/Angielski/Miękka/321 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liliana Ardissono;Alfred Kobsa;Mark T. Maybury

TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by current set-top boxes. To ensure broad adoption of this technology by consumers, future Digital Television will have to take usability issues thoroughly into account. In particular, serious attention must be paid to facilitate the selection of content on an individual basis, and to provide easy-to-use interfaces that satisfy viewers' interaction requirements.

This volume collects selected research reports on the development of personalized...

TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by curren...

cena: 603,81

 Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings Joye, Marc 9783642174544 Not Avail
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings

ISBN: 9783642174544 / Angielski / Miękka / 467 str.

ISBN: 9783642174544/Angielski/Miękka/467 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Joye; Atsuko Miyaji; Akira Otsuka
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
cena: 201,24

 The Codes of Life: The Rules of Macroevolution Barbieri, Marcello 9789048176113 Springer
The Codes of Life: The Rules of Macroevolution

ISBN: 9789048176113 / Angielski / Miękka / 440 str.

ISBN: 9789048176113/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcello Barbieri

Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics.

The book's 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes - organic, mental and cultural - that paved the way for the major transitions in the history of life.

While the...

Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading name...

cena: 1006,38

 Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi 9783642176180 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

ISBN: 9783642176180 / Angielski / Miękka / 355 str.

ISBN: 9783642176180/Angielski/Miękka/355 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swee-Huay Heng;Rebecca N. Wright;Bok-Min Goi
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
cena: 201,24

 Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers Kim, Hyoung-Joong 9783642184048 Not Avail
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers

ISBN: 9783642184048 / Angielski / Miękka / 317 str.

ISBN: 9783642184048/Angielski/Miękka/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hyoung-Joong Kim
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
cena: 201,24

 An Introduction to Mathematical Cryptography Jeffrey Hoffstein Jill Pipher J. H. Silverman 9781441926746 Springer
An Introduction to Mathematical Cryptography

ISBN: 9781441926746 / Angielski / Miękka / 524 str.

ISBN: 9781441926746/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeffrey Hoffstein; Jill Pipher; J. H. Silverman
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret c- munications. It is hard to overestimate the importance of public key cr- tosystems and their associated digital signature schemes in the modern world of computers and the Internet. This book provides an introduction to the theory of public key cryptography and to the mathematical ideas underlying that theory. Public key cryptography draws on many areas of mathematics, including number...
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman ...
cena: 201,24

 Preferences and Similarities Giacomo Riccia 9783211999417 Springer
Preferences and Similarities

ISBN: 9783211999417 / Angielski / Miękka / 320 str.

ISBN: 9783211999417/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Giacomo Riccia

The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impact of vagueness, imprecision, uncertainty and dominance on human and agent information, communication, planning, decision, action, and control as well as by the technical progress of the information technology itself. The topics treated in this book are of interest to computer scientists, statisticians, operations researchers, experts in AI, cognitive psychologists and economists.


The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impa...

cena: 603,81

 Securing Emerging Wireless Systems: Lower-Layer Approaches Chen, Yingying 9781441946935 Springer
Securing Emerging Wireless Systems: Lower-Layer Approaches

ISBN: 9781441946935 / Angielski / Miękka / 362 str.

ISBN: 9781441946935/Angielski/Miękka/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a...

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the...

cena: 402,53

 Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings Dimitris Gritzalis, Javier Lopez 9783642101762 Springer-Verlag Berlin and Heidelberg GmbH &
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings

ISBN: 9783642101762 / Angielski / Miękka / 444 str.

ISBN: 9783642101762/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis;Javier Lopez
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a...
cena: 402,53

 VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security John R. Goodall, Gregory Conti, Kwan-Liu Ma 9783642096884 Springer-Verlag Berlin and Heidelberg GmbH &
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security

ISBN: 9783642096884 / Angielski / Miękka / 273 str.

ISBN: 9783642096884/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John R. Goodall;Gregory Conti;Kwan-Liu Ma

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume...

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide secur...

cena: 201,24

 Fractal Image Encoding and Analysis Yuval Fisher 9783642083242 Springer
Fractal Image Encoding and Analysis

ISBN: 9783642083242 / Angielski / Miękka / 370 str.

ISBN: 9783642083242/Angielski/Miękka/370 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuval Fisher
The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced Study Institute held in 1995, presents work by leading researchers. It is developing the subjects at an introductory level, but it also has some recent and exciting results in both fields.
The book contains a thorough discussion of fractal image compression and decompression, including both continuous and discrete formulations, vector space and hierarchical methods, and algorithmic optimizations. The book also discusses multifractal approaches...
The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced St...
cena: 805,10

 Public-Key Cryptography Arto Salomaa 9783642082542 Springer
Public-Key Cryptography

ISBN: 9783642082542 / Angielski / Miękka / 275 str.

ISBN: 9783642082542/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arto Salomaa
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
cena: 201,24

 Power Analysis Attacks: Revealing the Secrets of Smart Cards Mangard, Stefan 9781441940391 Springer
Power Analysis Attacks: Revealing the Secrets of Smart Cards

ISBN: 9781441940391 / Angielski / Miękka / 338 str.

ISBN: 9781441940391/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Mangard; Elisabeth Oswald; Thomas Popp

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how...

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo...

cena: 724,58

 Database Machines: International Workshop Munich, September 1983 Leilich, H. -O 9783540129592 Springer
Database Machines: International Workshop Munich, September 1983

ISBN: 9783540129592 / Angielski / Miękka / 344 str.

ISBN: 9783540129592/Angielski/Miękka/344 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
H. -O Leilich; M. Missikoff
The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Sept. 82). The workshop is aimed at providing an interchange of ideas and experience on computer systems designed to perform database operations more efficiently than general purpose computers with a software database management system. Many proposals have been published during the past 10 years, but now several systems have been built and practically implemented and some are even commercially available, so that confrontation with the real world...
The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Se...
cena: 402,53

 A Classical Introduction to Cryptography Exercise Book Thomas Baigneres Pascal Junod Yi Lu 9781441939128 Springer
A Classical Introduction to Cryptography Exercise Book

ISBN: 9781441939128 / Angielski / Miękka / 254 str.

ISBN: 9781441939128/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Baigneres; Pascal Junod; Yi Lu
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
cena: 173,06

 Advances in Cryptology - Eurocrypt '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21 Guillou, Louis C. 9783540594093 Springer
Advances in Cryptology - Eurocrypt '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21

ISBN: 9783540594093 / Angielski / Miękka / 417 str.

ISBN: 9783540594093/Angielski/Miękka/417 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J. J. Quisquater; G. Goos; J. Hartmanis
EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of...
EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616visio...
cena: 201,24

 Advances in Cryptology – EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings Ueli Maurer 9783540611868 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings

ISBN: 9783540611868 / Angielski / Miękka / 416 str.

ISBN: 9783540611868/Angielski/Miękka/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ueli Maurer
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His...
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Sa...
cena: 201,24

Pierwsza Podprzednia  100  101  102  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia