• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security Practice and Experience: 4th International Conference, Ispec 2008 Sydney, Australia, April 21-23, 2008 Proceedings Chen, Liqun 9783540791034 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security Practice and Experience: 4th International Conference, Ispec 2008 Sydney, Australia, April 21-23, 2008 Proceedings

ISBN: 9783540791034 / Angielski / Miękka / 420 str.

ISBN: 9783540791034/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of papers.
weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of papers.
cena: 201,24

 Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20 Karabulut, Yücel 9780387094274 Springer
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20

ISBN: 9780387094274 / Angielski / Twarda / 372 str.

ISBN: 9780387094274/Angielski/Twarda/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yucel Karabulut; John C. Mitchell; Peter Herrmann
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
cena: 402,53

 Progress in Cryptology - Africacrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings Vaudenay, Serge 9783540681595 Springer
Progress in Cryptology - Africacrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings

ISBN: 9783540681595 / Angielski / Miękka / 420 str.

ISBN: 9783540681595/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serge Vaudenay
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in J...
cena: 201,24

 Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, Ny, Usa, June 3-6, 2008, Proceedings Bellovin, Steven M. 9783540689133 Springer
Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, Ny, Usa, June 3-6, 2008, Proceedings

ISBN: 9783540689133 / Angielski / Miękka / 508 str.

ISBN: 9783540689133/Angielski/Miękka/508 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven M. Bellovin
ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia University. ACNS 2008 was organized in cooperation with the International - sociation for Cryptologic Research (IACR) and the Department of Computer Science at Columbia University. The General Chairs of the conference were - gelos Keromytis and Moti Yung. The conference received 131 submissions, of which the Program Committee, chairedbyStevenBellovinandRosarioGennaro, selected 30 for presentation at the conference. The Best Student Paper Award was given...
ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia Universit...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security III Yun Q. Shi 9783540690160 Springer
Transactions on Data Hiding and Multimedia Security III

ISBN: 9783540690160 / Angielski / Miękka / 91 str.

ISBN: 9783540690160/Angielski/Miękka/91 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue covers steganography and digital watermarking.
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and a...
cena: 201,24

 Pervasive Computing: 6th International Conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008 Indulska, Jadwiga 9783540795759 Springer
Pervasive Computing: 6th International Conference, Pervasive 2008, Sydney, Australia, May 19-22, 2008

ISBN: 9783540795759 / Angielski / Miękka / 315 str.

ISBN: 9783540795759/Angielski/Miękka/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jadwiga Indulska
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, held in Sydney in May 2008. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organised in topical sections.
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, held in Sydney in May 2008....
cena: 201,24

 Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 José A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis 9783540799658 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008

ISBN: 9783540799658 / Angielski / Miękka / 151 str.

ISBN: 9783540799658/Angielski/Miękka/151 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
José A. Onieva;Damien Sauveron;Serge Chaumette
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices held in Seville in May 2008. The ten revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book.
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices held i...
cena: 201,24

 Open Source Systems Security Certification Ernesto Damiani Claudio Agostino Ardagna Nabil Nabi 9780387773230 Springer
Open Source Systems Security Certification

ISBN: 9780387773230 / Angielski / Twarda / 204 str.

ISBN: 9780387773230/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ernesto Damiani; Claudio Agostino Ardagna; Nabil Nabil El Ioini

Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems;

Ensuring integrated systems,...

Open Source Advances in Computer Applications book series provides timely technological and business information for:

...
cena: 402,53

 Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Yi Mu, Willy Susilo, Jennifer Seberry 9783540699712 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings

ISBN: 9783540699712 / Angielski / Miękka / 480 str.

ISBN: 9783540699712/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yi Mu;Willy Susilo;Jennifer Seberry
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected...
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The confer...
cena: 201,24

 Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi Zamboni, Diego 9783540705413 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi

ISBN: 9783540705413 / Angielski / Miękka / 292 str.

ISBN: 9783540705413/Angielski/Miękka/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Diego Zamboni
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading researchers and practitionersfromacademia, governmentandindustrytopresentanddiscussnovel security research. DIMVA is organized by the Security Intrusion Detection and Response(SIDAR)specialinterestgroupoftheGermanInformaticsSociety(GI). The DIMVA 2008 Program Committee received 42 submissions from 16 d- ferent countries, and from...
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and...
cena: 201,24

 Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce Atluri, Vijay 9783540705666 Springer
Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce

ISBN: 9783540705666 / Angielski / Miękka / 368 str.

ISBN: 9783540705666/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Atluri
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13-16, 2008. This year's working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and...
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don,...
cena: 201,24

 Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings Borisov, Nikita 9783540706298 Springer
Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

ISBN: 9783540706298 / Angielski / Miękka / 254 str.

ISBN: 9783540706298/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikita Borisov
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a premier venue for publishing original research on privacy-enhancing technologies. PETS received 48 submissions, each of which wasreviewedbyatleastfourmembersoftheProgramCommittee.Thirteenwere accepted into the program, maintaining the selective and competitive nature of the event. The program also included a keynote address by Stuart Shapiro. A...
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition f...
cena: 201,24

 Information Security and Cryptology: Third Sklois Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers Pei, Dingyi 9783540794981 Springer
Information Security and Cryptology: Third Sklois Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

ISBN: 9783540794981 / Angielski / Miękka / 534 str.

ISBN: 9783540794981/Angielski/Miękka/534 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dingyi Pei

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret...

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Confer...

cena: 201,24

 Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers Tsudik, Gene 9783540852292 Springer
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

ISBN: 9783540852292 / Angielski / Miękka / 346 str.

ISBN: 9783540852292/Angielski/Miękka/346 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gene Tsudik
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier...
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2...
cena: 201,24

 Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008 Jajodia, Sushil 9780387096988 SPRINGER
Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008

ISBN: 9780387096988 / Angielski / Twarda / 738 str.

ISBN: 9780387096988/Angielski/Twarda/738 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with I...
cena: 603,81

 A Laboratory Course for Programming with Java Dale 9780763758271 JONES AND BARTLETT PUBLISHERS, INC
A Laboratory Course for Programming with Java

ISBN: 9780763758271 / Angielski / Miękka / 161 str.

ISBN: 9780763758271/Angielski/Miękka/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dale
The Active Learning Approach Of A Laboratory Course For Programming With Java, Second Edition Engages Students In The Process Of Understanding And Implementing Programming Language Concepts. A Perfect Companion To Any Introductory Java Programming Course, This Manual Provides 14 Hands-On Laboratory Activities, Each Of Which Contains Prelab, In-Lab, And Post-Lab Exercises. In Each Lesson Students Have The Opportunity To Apply Their Textbook Knowledge, Gain Programming Experience, And Acquire Meaningful Understanding Of Language Concepts.
The Active Learning Approach Of A Laboratory Course For Programming With Java, Second Edition Engages Students In The Process Of Understanding And Imp...
cena: 362,09

 C++ Data Structures: A Laboratory Course: A Laboratory Course Brandle, Stefan 9780763755645 JONES AND BARTLETT PUBLISHERS, INC
C++ Data Structures: A Laboratory Course: A Laboratory Course

ISBN: 9780763755645 / Angielski / Miękka / 174 str.

ISBN: 9780763755645/Angielski/Miękka/174 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brandle
C++ Data Structures: A Laboratory Course Exemplifies The Active Learning Experience. With A Dynamic Learn-By-Doing Focus, This Laboratory Manual Encourages Students To Explore Data Structures By Implementing Them, A Process Through Which Students Discover How Data Structures Work And How They Can Be Applied. Providing A Framework That Offers Feedback And Support, This Text Challenges Students To Exercise Their Creativity In Both Programming And Analysis. Topics Covered Include: Text ADT, Blogentry ADT, Stack ADT, Heap ADT, Weighted Graph ADT, And Much More!
C++ Data Structures: A Laboratory Course Exemplifies The Active Learning Experience. With A Dynamic Learn-By-Doing Focus, This Laboratory Manual Encou...
cena: 538,76

 Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection Wang, Yun 9781599047089 Information Science Reference
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

ISBN: 9781599047089 / Angielski / Twarda / 476 str.

ISBN: 9781599047089/Angielski/Twarda/476 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Wang
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
cena: 845,50

 Computer Safety, Reliability, and Security: 27th International Conference, Safecomp 2008 Newcastle Upon Tyne, Uk, September 22-25, 2008 Proceedings Harrison, Michael Douglas 9783540876977 Springer
Computer Safety, Reliability, and Security: 27th International Conference, Safecomp 2008 Newcastle Upon Tyne, Uk, September 22-25, 2008 Proceedings

ISBN: 9783540876977 / Angielski / Miękka / 456 str.

ISBN: 9783540876977/Angielski/Miękka/456 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael D. Harrison
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008. The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault tolerance, security, safety cases, formal methods, dependability modelling, as well as security and dependability.
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held...
cena: 201,24

 Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Lucks, Stefan 9783540883524 Springer
Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

ISBN: 9783540883524 / Angielski / Miękka / 170 str.

ISBN: 9783540883524/Angielski/Miękka/170 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Lucks
The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst G] ortzInstituteforSecurityinInformationSystems(HGI), andtheSpecialInt- est Groupon Cryptology(FG Krypto) of the German Computer Science Society (Gesellschaft fu ]r Informatik e.V.). The aim was to bring together researchers in the?eldofcryptology.TheworkshopfocusedonresearchfromMastersandPhD students, and brought them together with more experienced senior researchers. The ?rst workshop (WEWoRC 2005) was held in Leuven. WEWoRC 2007 was held in...
The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst...
cena: 201,24

Pierwsza Podprzednia  67  68  69  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia