• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2628

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Privacy Enhancing Technologies: 10th International Symposium, Pets 2010, July 21-23, 2010, Berlin, Germany, Proceedings Atallah, Mikhail 9783642145261 Not Avail
Privacy Enhancing Technologies: 10th International Symposium, Pets 2010, July 21-23, 2010, Berlin, Germany, Proceedings

ISBN: 9783642145261 / Angielski / Miękka / 296 str.

ISBN: 9783642145261/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mikhail Atallah
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. This book features the papers handling topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, and more.
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. This book features the pape...
cena: 201,72 zł

 It Security Management: It Securiteers - Setting Up an It Security Function Partida, Alberto 9789048188819 Springer
It Security Management: It Securiteers - Setting Up an It Security Function

ISBN: 9789048188819 / Angielski / Twarda / 247 str.

ISBN: 9789048188819/Angielski/Twarda/247 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alberto Partida; Diego Andina

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company....

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international stan...

cena: 403,47 zł

 Preserving Privacy in Data Outsourcing Sara Foresti 9781441976581 Not Avail
Preserving Privacy in Data Outsourcing

ISBN: 9781441976581 / Angielski / Twarda / 198 str.

ISBN: 9781441976581/Angielski/Twarda/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are...

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and leg...

cena: 403,47 zł

 Securing Strats in Linux Platforms and Applications Jang, Michael 9780763791896 Jones & Bartlett Publishers
Securing Strats in Linux Platforms and Applications

ISBN: 9780763791896 / Angielski / Miękka / 512 str.

ISBN: 9780763791896/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Jang
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Covers Every Major Aspect Of Security On A Linux System. Written By An Industry Expert, This Book Is Divided Into Three Natural Parts To Illustrate Key Concepts In The Field. It Opens With A Discussion On The Risks, Threats, And Vulnerabilities Associated With Linux As An Operating System Using Examples From Red Hat Enterprise Linux And Ubuntu. Part 2 Discusses How To Take Advantage Of The Layers Of Security Available To Linux--User And Group...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Cov...
cena: 544,05 zł

 Advances in Systems Safety: Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, Uk, 8-10th February 2011 Dale, Chris 9780857291325 Not Avail
Advances in Systems Safety: Proceedings of the Nineteenth Safety-Critical Systems Symposium, Southampton, Uk, 8-10th February 2011

ISBN: 9780857291325 / Angielski / Miękka / 315 str.

ISBN: 9780857291325/Angielski/Miękka/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Dale; Tom Anderson
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.

The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress.

The 17 papers in this volume are presented...

Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in Febru...
cena: 605,23 zł

 Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, Ny, Usa, September 20-22, 2010, Proceedi Dolev, Shlomi 9783642160226 Not Avail
Stabilization, Safety, and Security of Distributed Systems: 12th International Symposium, SSS 2010, New York, Ny, Usa, September 20-22, 2010, Proceedi

ISBN: 9783642160226 / Angielski / Miękka / 614 str.

ISBN: 9783642160226/Angielski/Miękka/614 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shlomi Dolev; Jorge Cobb; Michael Fischer
The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held September 20 22, 2010 at Columbia University, NYC, USA. The SSS symposium is an international forum for researchersand practiti- ers in the design and development of distributed systems with self-* properties: (theclassical)self-stabilizing, self-con?guring, self-organizing, self-managing, se- repairing, self-healing, self-optimizing, self-adaptive, andself-protecting. Research in distributed systems is now at a crucial point in its evolution,...
The papers in this volume were presented at the 12th International Sym- sium on Stabilization, Safety, and Security of Distributed Systems (SSS), held...
cena: 403,47 zł

 Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009, Revised Selected Papers Bao, Feng 9783642163418 Not Avail
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009, Revised Selected Papers

ISBN: 9783642163418 / Angielski / Miękka / 460 str.

ISBN: 9783642163418/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao; Moti Yung; Dongdai Lin
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of...
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information Secur...
cena: 201,72 zł

 Wireless Network Security Yang Xiao Xuemin Shen Ding-Zhu Du 9781441939197 Not Avail
Wireless Network Security

ISBN: 9781441939197 / Angielski / Miękka / 424 str.

ISBN: 9781441939197/Angielski/Miękka/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiao; Xuemin Shen; Ding-Zhu Du

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.


This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles...

cena: 605,23 zł

 Fundamentals of Computer Security Josef Pieprzyk Thomas Hardjono Jennifer Seberry 9783642077135 Not Avail
Fundamentals of Computer Security

ISBN: 9783642077135 / Angielski / Miękka / 677 str.

ISBN: 9783642077135/Angielski/Miękka/677 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pieprzyk; Thomas Hardjono; Jennifer Seberry
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system....
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securi...
cena: 229,96 zł

 Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selec Ors Yalcin, Siddika Berna 9783642168215 Not Avail
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selec

ISBN: 9783642168215 / Angielski / Miękka / 271 str.

ISBN: 9783642168215/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Siddika Berna Ors Yalcin
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, held in Istanbul, Turkey, in June 2010. The 17 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 47 submissions. The papers focus on approaches to solve security and data-protection issues in advancedcontactless technologies like RFID. Topics addressed are new applications for secure RFID systems, data protection and privacy-enhancing techniques for RFID, cryptographic protocols for RFID,...
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec ...
cena: 201,72 zł

 Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings Gong, Guang 9783642174001 Not Avail
Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings

ISBN: 9783642174001 / Angielski / Miękka / 366 str.

ISBN: 9783642174001/Angielski/Miękka/366 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guang Gong; Kishan Chand Gupta
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010.The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation.
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, ...
cena: 201,72 zł

 Distributed Computing and Networking Aguilera, Marcos K. 9783642176784 Not Avail
Distributed Computing and Networking

ISBN: 9783642176784 / Angielski / Miękka / 420 str.

ISBN: 9783642176784/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marcos K. Aguilera; Haifeng Yu; Nitin H. Vaidya
This book constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking, ICDCN 2011, held in Bangalore, India, during January 2-5, 2011.The 31 revised full papers and 3 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 140 submissions. The papers address all current issues in the field of distributed computing and networking. Being a leading forum for researchers and practitioners to exchange ideas and share best practices, ICDCN also serves as a forum for PhD students to share their...
This book constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking, ICDCN 2011, held in Banga...
cena: 201,72 zł

 Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 Somesh Jha, Anish Mathuria 9783642177132 Springer-Verlag Berlin and Heidelberg GmbH &
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010

ISBN: 9783642177132 / Angielski / Miękka / 261 str.

ISBN: 9783642177132/Angielski/Miękka/261 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Somesh Jha;Anish Mathuria
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced 1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype 3]. Below isabrief introduction toSQL- jection vulnerability though the security...
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced 1]....
cena: 201,72 zł

 Information Security: 13th International Conference, Isc 2010, Boca Raton, Fl, Usa, October 25-28, 2010, Revised Selected Papers Burmester, Mike 9783642181771 Not Avail
Information Security: 13th International Conference, Isc 2010, Boca Raton, Fl, Usa, October 25-28, 2010, Revised Selected Papers

ISBN: 9783642181771 / Angielski / Miękka / 446 str.

ISBN: 9783642181771/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mike Burmester; Gene Tsudik; Spyros S. Magliveras
This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography,...
This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in...
cena: 201,72 zł

 Network Security, Administration and Management: Advancing Technology and Practice Kar, Dulal Chandra 9781609607777 Information Science Publishing
Network Security, Administration and Management: Advancing Technology and Practice

ISBN: 9781609607777 / Angielski / Twarda / 384 str.

ISBN: 9781609607777/Angielski/Twarda/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dulal Chandra Kar; Mahbubur Rahman Syed
Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.
Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and pri...
cena: 990,96 zł

 Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki 9783642168246 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings

ISBN: 9783642168246 / Angielski / Miękka / 371 str.

ISBN: 9783642168246/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Isao Echizen;Noboru Kunihiro;Ryoichi Sasaki
The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter, Kobe, Japan, November22-24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC, atechnicalgroupconcernedwiththe informationsecurityofTheInstitute of Electronics, Information and Communication Engineers (IEICE). The exc- lentLocalOrganizingCommitteewasledbytheIWSEC2010GeneralCo-chairs, Hiroaki Kikuchi and Toru Fujiwara. This year IWSEC 2010 had three tracks, the Foundations...
The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter, Kobe, Japan, November22-24,2010. Thewo- shop...
cena: 201,72 zł

 Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Paper Martinelli, Fabio 9783642164408 Not Avail
Public Key Infrastructures, Services and Applications: 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Paper

ISBN: 9783642164408 / Angielski / Miękka / 303 str.

ISBN: 9783642164408/Angielski/Miękka/303 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fabio Martinelli; Bart Preneel
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009.
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 20...
cena: 201,72 zł

 Machine Learning in Cyber Trust: Security, Privacy, and Reliability Tsai, Jeffrey J. P. 9781441946980 Springer
Machine Learning in Cyber Trust: Security, Privacy, and Reliability

ISBN: 9781441946980 / Angielski / Miękka / 362 str.

ISBN: 9781441946980/Angielski/Miękka/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover...

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose priva...

cena: 625,41 zł

 Secure Multi-Party Non-Repudiation Protocols and Applications Springer 9781441945396 Springer
Secure Multi-Party Non-Repudiation Protocols and Applications

ISBN: 9781441945396 / Angielski / Miękka / 190 str.

ISBN: 9781441945396/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level...

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio...

cena: 403,47 zł

 Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac Futcher, Lynn 9781441944580 Springer
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac

ISBN: 9781441944580 / Angielski / Miękka / 148 str.

ISBN: 9781441944580/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lynn Futcher; Ronald Dodge

International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings...

International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform...

cena: 201,72 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia