• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5402

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Paul Piccard (Director of Threat Research for Webroot, USA) 9781597490641 Syngress Media,U.S.
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat

ISBN: 9781597490641 / Angielski / Miękka / 448 str.

ISBN: 9781597490641/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) Paul Piccard (Director of Threat Research for Webroot
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
cena: 302,75 zł

 Building a VoIP Network with Nortel's Multimedia Communication Server 5100 Larry Chaffin (CEO/Chairman of Pluto Networks; Vice President of Advanced Network Technologies, Plannet Group, USA) 9781597490788 Syngress Media,U.S.
Building a VoIP Network with Nortel's Multimedia Communication Server 5100

ISBN: 9781597490788 / Angielski / Miękka / 550 str.

ISBN: 9781597490788/Angielski/Miękka/550 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Larry Chaffin (CEO/Chairman of Pluto Networks; Vice Presiden
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.

This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls....

The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.

Thi...

cena: 367,49 zł

 Winternals Defragmentation, Recovery, and Administration Field Guide Dave Kleiman (International Association of Counter Terrorism and Security Professionals, International Society of Forens 9781597490795 Syngress Media,U.S.
Winternals Defragmentation, Recovery, and Administration Field Guide

ISBN: 9781597490795 / Angielski / Miękka / 512 str.

ISBN: 9781597490795/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dave Kleiman (International Association of Counter Terrorism;Laura E Hunter (Senior IT Specialist with the University of
The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.

The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. The next chapters introduce the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak which repairs unbootable or locked-out systems, restores lost data, and removes malware from infected machines. Chapters on the Administrator' Pak...

The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.

The book begins with a chapter d...

cena: 302,75 zł

 Firewall Policies and VPN Configurations Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh (Security Researcher on the Microsoft Malware Protectio 9781597490887 Syngress Media,U.S.
Firewall Policies and VPN Configurations

ISBN: 9781597490887 / Angielski / Miękka / 550 str.

ISBN: 9781597490887/Angielski/Miękka/550 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Syngress;Dale Liu;Stephanie Miller
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
cena: 302,75 zł

 Cryptography for Developers Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) 9781597491044 Syngress Media,U.S.
Cryptography for Developers

ISBN: 9781597491044 / Angielski / Miękka / 400 str.

ISBN: 9781597491044/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom St Denis (senior software developer and cryptographer fo
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers b...

cena: 367,49 zł

 Virtualization with Microsoft Virtual Server 2005 Andy Jones, Rogier Dittner (MCSE NT4, 2000, 2003, MCDBA, MCT, MSF Practitioner), consultant at a Microsoft partner), Dav 9781597491068 Syngress Media,U.S.
Virtualization with Microsoft Virtual Server 2005

ISBN: 9781597491068 / Angielski / Miękka / 481 str.

ISBN: 9781597491068/Angielski/Miękka/481 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andy Jones; MSF Practi MCT MCDBA 2003 2000 Rogier Dittner (MCSE NT4; CCA and Senio Citrix CCEA MCP VAC David Rule (VMware VCP
A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.

This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough...

A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physica...
cena: 302,75 zł

 How to Cheat at Managing Information Security Mark Osborne (Cheif Information Security Officer at Interoute) 9781597491105 Syngress Media,U.S.
How to Cheat at Managing Information Security

ISBN: 9781597491105 / Angielski / Miękka / 352 str.

ISBN: 9781597491105/Angielski/Miękka/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Osborne (Cheif Information Security Officer at Interout
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.

These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
cena: 248,80 zł

 WarDriving and Wireless Penetration Testing Chris Hurley (Senior Penetration Tester, Washington, DC, USA), Russ Rogers, Frank Thornton (Owner, Blackthorn Systems, N 9781597491112 Syngress Media,U.S.
WarDriving and Wireless Penetration Testing

ISBN: 9781597491112 / Angielski / Miękka / 446 str.

ISBN: 9781597491112/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA DC Washington Chris Hurley (Senior Penetration Tester;Russ Rogers; US New Hampshire Blackthorn Systems Frank Thornton (Owner
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
cena: 286,57 zł

 BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) 9781597491129 Syngress Media,U.S.
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic

ISBN: 9781597491129 / Angielski / Miękka / 291 str.

ISBN: 9781597491129/Angielski/Miękka/291 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom St Denis (senior software developer and cryptographer fo
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.

Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum...

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide suppor...
cena: 291,96 zł

 Dictionary of Information Security Robert Slade 9781597491150 Syngress Publishing
Dictionary of Information Security

ISBN: 9781597491150 / Angielski / Miękka / 256 str.

ISBN: 9781597491150/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Slade
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security] will also find this a...

The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will fin...
cena: 114,86 zł

 Kismet Hacking Brad Haines Frank Thornton 9781597491174 Syngress Publishing
Kismet Hacking

ISBN: 9781597491174 / Angielski / Miękka / 258 str.

ISBN: 9781597491174/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brad Haines; Frank Thornton
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book...

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthus...
cena: 205,23 zł

 Configuring Juniper Networks Netscreen and Ssg Firewalls Cameron, Rob 9781597491181 Syngress Publishing
Configuring Juniper Networks Netscreen and Ssg Firewalls

ISBN: 9781597491181 / Angielski / Miękka / 743 str.

ISBN: 9781597491181/Angielski/Miękka/743 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rob Cameron; Brad Woodberg; Mohan Krishnamurthy Madwachar
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.

  • Configure Juniper's Instant Virtual Extranet (IVE)
  • Install...
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest se...
cena: 180,80 zł

 Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures Brian T Contos (CISSP, Chief Security Officer, ArcSight Inc.) 9781597491297 Syngress Media,U.S.
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

ISBN: 9781597491297 / Angielski / Miękka / 304 str.

ISBN: 9781597491297/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
ArcSight Inc. Chief Security Officer Brian T Contos (CISSP
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.

Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
cena: 302,75 zł

 Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors Reyes, Anthony 9781597491334 Syngress Publishing
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

ISBN: 9781597491334 / Angielski / Miękka / 432 str.

ISBN: 9781597491334/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anthony Reyes; Richard Brittson; Kevin O'Shea
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only...

Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The bo...

cena: 215,01 zł

 Botnets: The Killer Web Applications Craig Schiller (CISO for Portland State University and President of Hawkeye Security Training, LLC), James R. Binkley (T 9781597491358 Syngress Media,U.S.
Botnets: The Killer Web Applications

ISBN: 9781597491358 / Angielski / Miękka / 480 str.

ISBN: 9781597491358/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Craig Schiller (CISO for Portland State University and Presi; and researcher network engineer James R. Binkley (Teacher;Anthony Bradley
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
cena: 302,75 zł

 XSS Attacks: Cross Site Scripting Exploits and Defense Seth Fogie (Vice President, Airscanner, Dallas, TX, USA), Jeremiah Grossman (Founder and CTO, WhiteHat Security, Santa C 9781597491549 Syngress Media,U.S.
XSS Attacks: Cross Site Scripting Exploits and Defense

ISBN: 9781597491549 / Angielski / Miękka / 480 str.

ISBN: 9781597491549/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) TX Dallas Airscanner Seth Fogie (Vice President; Santa WhiteHat Security Jeremiah Grossman (Founder and CTO;Robert Hansen (Founder of the Hackers.org Web Application Se
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.

XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
cena: 367,49 zł

 Alternate Data Storage Forensics Amber Schroader (CEO, Paraben Corporation, Dallas, TX, USA), Tyler Cohen ((CISSP) Computer Science Corporation & Researc 9781597491631 Syngress Media,U.S.
Alternate Data Storage Forensics

ISBN: 9781597491631 / Angielski / Miękka / 400 str.

ISBN: 9781597491631/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA) TX Dallas Paraben Corporation Amber Schroader (CEO;Tyler Cohen ((CISSP) Computer Science Corporation & Research
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of...
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
cena: 367,49 zł

 AVIEN Malware Defense Guide for the Enterprise David Harley (Formerly UK's National Health Service, National Infrastructure Security Manager, Independent author and co 9781597491648 Syngress Media,U.S.
AVIEN Malware Defense Guide for the Enterprise

ISBN: 9781597491648 / Angielski / Miękka / 656 str.

ISBN: 9781597491648/Angielski/Miękka/656 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nationa David Harley (Formerly UK's National Health Service;Robert S. Vibert;Ken Bechtel
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about...

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on ...
cena: 367,49 zł

 Linksys WRT54G Ultimate Hacking Paul Asadoorian Larry Pesce Raul Siles 9781597491662 Syngress Publishing
Linksys WRT54G Ultimate Hacking

ISBN: 9781597491662 / Angielski / Miękka / 368 str.

ISBN: 9781597491662/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul Asadoorian; Larry Pesce; Raul Siles
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models...
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a n...
cena: 141,70 zł

 Zen and the Art of Information Security Ira Winkler ((CISSP), President, Internet Security Advisors Group; author of Spies Among Us) 9781597491686 Syngress Media,U.S.
Zen and the Art of Information Security

ISBN: 9781597491686 / Angielski / Miękka / 192 str.

ISBN: 9781597491686/Angielski/Miękka/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Internet Security Advisors President Ira Winkler ((CISSP)
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security underst...
cena: 189,46 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia