• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier Gilbert, Henri 9783642131899 Not Avail
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier

ISBN: 9783642131899 / Angielski / Miękka / 712 str.

ISBN: 9783642131899/Angielski/Miękka/712 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henri Gilbert
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30 June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as...
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques....
cena: 201,24

 Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers Hong, Seokhie 9783642138577 Not Avail
Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers

ISBN: 9783642138577 / Angielski / Miękka / 385 str.

ISBN: 9783642138577/Angielski/Miękka/385 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seokhie Hong; Tetsu Iwata
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2002, theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996), Haifa, Israel(1997), Paris, France(1998), Rome, Italy(1999), NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006),...
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2...
cena: 201,24

 Computer Networks: 17th Conference, Cn 2010, Ustron, Poland, June 15-19, 2010. Proceedings Kwiecien, Andrzej 9783642138607 Not Avail
Computer Networks: 17th Conference, Cn 2010, Ustron, Poland, June 15-19, 2010. Proceedings

ISBN: 9783642138607 / Angielski / Miękka / 359 str.

ISBN: 9783642138607/Angielski/Miękka/359 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrzej Kwiecien; Piotr Gaj; Piotr Stera
The continuous and intensive development of computer science results in the fast progress of computer networks. Computer networks, as well as the entire computer science ?eld, are subject to regular changes caused by the general development of technology, and also the in?uence of new computer science te- nology. This progress refers to the methods as well as the tools of designing and modelingcomputernetworks. Particularly, therangeofusingcomputernetworks permanently is extended thanks to the results of new research and new app- cations, which were not even taken into consideration in the...
The continuous and intensive development of computer science results in the fast progress of computer networks. Computer networks, as well as the enti...
cena: 201,24

 Model-Driven Risk Analysis: The Coras Approach Lund, Mass Soldal 9783642123221 SPRINGER
Model-Driven Risk Analysis: The Coras Approach

ISBN: 9783642123221 / Angielski / Twarda / 460 str.

ISBN: 9783642123221/Angielski/Twarda/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roy Lund;¬Abar
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a...
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security ri...
cena: 201,24

 Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers Kurosawa, Kaoru 9783642144950 Not Avail
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers

ISBN: 9783642144950 / Angielski / Miękka / 249 str.

ISBN: 9783642144950/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaoru Kurosawa
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity, alsocalledunconditionalsecurity, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Informat...
cena: 201,24

 Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings Rabin, Tal 9783642146220 Not Avail
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings

ISBN: 9783642146220 / Angielski / Miękka / 741 str.

ISBN: 9783642146220/Angielski/Miękka/741 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tal Rabin
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of C- ifornia at Santa Barbara. The conference was held in Santa Barbara, Calif- nia, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zul?kar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions...
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operati...
cena: 201,24

 Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures Focardi, Riccardo 9783540209553 Springer
Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures

ISBN: 9783540209553 / Angielski / Miękka / 272 str.

ISBN: 9783540209553/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Gorrieri; Riccardo Focardi

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness.

This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro,...

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactio...

cena: 201,24

 Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings Pieprzyk, Josef 9783642119248 Springer
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings

ISBN: 9783642119248 / Angielski / Miękka / 397 str.

ISBN: 9783642119248/Angielski/Miękka/397 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pieprzyk
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got...
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf...
cena: 201,24

 Programming with Javascript: Algorithms and Applications for Desktop and Mobile Browsers: Algorithms and Applications for Desktop and Mobile Browsers Dionisio, John David 9780763780609 Jones & Bartlett Publishers
Programming with Javascript: Algorithms and Applications for Desktop and Mobile Browsers: Algorithms and Applications for Desktop and Mobile Browsers

ISBN: 9780763780609 / Angielski / Miękka / 670 str.

ISBN: 9780763780609/Angielski/Miękka/670 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John David Dionisio; Ray Toal;Dionisio
Designed specifically for the CS-1 Introductory Programming Course, "Programming with JavaScript: Algorithms and Applications for Desktop and Mobile Browsers" introduces students to computer science and programming using a modern approach.
Designed specifically for the CS-1 Introductory Programming Course, "Programming with JavaScript: Algorithms and Applications for Desktop and Mobile B...
cena: 813,03

 Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings Steinfeld, Ron 9783642140808 Not Avail
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings

ISBN: 9783642140808 / Angielski / Miękka / 403 str.

ISBN: 9783642140808/Angielski/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ron Steinfeld; Philip Hawkes
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the...
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research ...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security V Yun Q. Shi 9783642142970 Not Avail
Transactions on Data Hiding and Multimedia Security V

ISBN: 9783642142970 / Angielski / Miękka / 129 str.

ISBN: 9783642142970/Angielski/Miękka/129 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,24

 Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings Schoitsch, Erwin 9783642156502 Not Avail
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings

ISBN: 9783642156502 / Angielski / Miękka / 482 str.

ISBN: 9783642156502/Angielski/Miękka/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Erwin Schoitsch
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the...
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and...
cena: 201,24

 Identitätsdiebstahl Und Identitätsmissbrauch Im Internet: Rechtliche Und Technische Aspekte Borges, Georg 9783642158322 Not Avail
Identitätsdiebstahl Und Identitätsmissbrauch Im Internet: Rechtliche Und Technische Aspekte

ISBN: 9783642158322 / Niemiecki / Twarda / 405 str.

ISBN: 9783642158322/Niemiecki/Twarda/405 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Georg Borges; Jorg Schwenk; Carl-Friedrich Stuckenberg
Identitatsdiebstahl und Identitatsmissbrauch im Internet sind eine ernste Bedrohung. Angriffe werden in der technischen Ausfuhrung und in der Wahl der Angriffsziele immer professioneller. Die Autoren untersuchen Fragen des Identitatsdiebstahls und Identitatsmissbrauchs aus technischer und rechtlicher Perspektive und leiten daraus Handlungsempfehlungen ab. Schwerpunkte sind die systematische Darstellung gegenwartiger Angriffe und kunftiger Entwicklungen, die Bedeutung des neuen Personalausweises, Strafbarkeit und Strafverfolgung sowie Haftungsfragen."
Identitatsdiebstahl und Identitatsmissbrauch im Internet sind eine ernste Bedrohung. Angriffe werden in der technischen Ausfuhrung und in der Wahl der...
cena: 489,08

 Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings Kurosawa, Kaoru 9783642162794 Not Avail
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings

ISBN: 9783642162794 / Angielski / Miękka / 279 str.

ISBN: 9783642162794/Angielski/Miękka/279 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swee-Huay Heng; Kaoru Kurosawa
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we...
cena: 201,24

 Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings Garay, Juan A. 9783642153167 Not Avail
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings

ISBN: 9783642153167 / Angielski / Miękka / 471 str.

ISBN: 9783642153167/Angielski/Miękka/471 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay; Roberto De Prisco
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September...
cena: 201,24

 Security Engineering for Service-Oriented Architectures Michael Hafner Ruth Breu 9783642098475 Springer
Security Engineering for Service-Oriented Architectures

ISBN: 9783642098475 / Angielski / Miękka / 248 str.

ISBN: 9783642098475/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Hafner; Ruth Breu
Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize security-critical applications for SOAs. In a second step, they apply the principles of model-driven security to SOAs.
Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize security-critical applications ...
cena: 201,24

 Global Initiatives to Secure Cyberspace: An Emerging Landscape Portnoy, Michael 9781441935304 Springer
Global Initiatives to Secure Cyberspace: An Emerging Landscape

ISBN: 9781441935304 / Angielski / Miękka / 163 str.

ISBN: 9781441935304/Angielski/Miękka/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions....
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasi...
cena: 402,53

 Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20 Karabulut, Yücel 9781441934772 Springer
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20

ISBN: 9781441934772 / Angielski / Miękka / 372 str.

ISBN: 9781441934772/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yucel Karabulut; John C. Mitchell; Peter Herrmann
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
cena: 402,53

 Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings Joye, Marc 9783642174544 Not Avail
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings

ISBN: 9783642174544 / Angielski / Miękka / 467 str.

ISBN: 9783642174544/Angielski/Miękka/467 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Joye; Atsuko Miyaji; Akira Otsuka
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
cena: 201,24

 On the Move to Meaningful Internet Systems: Otm 2010: Confederated International Conferences: Coopis, Is, DOA and Odbase, Hersonissos, Crete, Greece, Meersman, Robert 9783642169489 Not Avail
On the Move to Meaningful Internet Systems: Otm 2010: Confederated International Conferences: Coopis, Is, DOA and Odbase, Hersonissos, Crete, Greece,

ISBN: 9783642169489 / Angielski / Miękka / 466 str.

ISBN: 9783642169489/Angielski/Miękka/466 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman; Tharam Dillon; Pilar Herrero
and ontologies, and CoopIS(CooperativeInformationSystems, since 1993), c- ering the application of these technologies in an enterprise context through, for example, work?owsystemsandknowledgemanagement. In2007theISworkshop (Information Security) was added to try cover also the speci?c issues of security in complex Internet-based information systems. Each of the main conferences speci?cally seeks high-quality contributions and encourages researchers to treat their respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c)...
and ontologies, and CoopIS(CooperativeInformationSystems, since 1993), c- ering the application of these technologies in an enterprise context through...
cena: 201,24

Pierwsza Podprzednia  70  71  72  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia