• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Yi Mu, Willy Susilo, Jennifer Seberry 9783540699712 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings

ISBN: 9783540699712 / Angielski / Miękka / 480 str.

ISBN: 9783540699712/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yi Mu;Willy Susilo;Jennifer Seberry
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong and the ResearchNetwork for a Secure Australia. The submission and review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland. We would like to thank them for letting us use their iChair software. The conferencereceived111submissions, out ofwhich the ProgramComm- tee selected...
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7 9, 2008. The confer...
cena: 203,13

 Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi Zamboni, Diego 9783540705413 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedi

ISBN: 9783540705413 / Angielski / Miękka / 292 str.

ISBN: 9783540705413/Angielski/Miękka/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Diego Zamboni
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading researchers and practitionersfromacademia, governmentandindustrytopresentanddiscussnovel security research. DIMVA is organized by the Security Intrusion Detection and Response(SIDAR)specialinterestgroupoftheGermanInformaticsSociety(GI). The DIMVA 2008 Program Committee received 42 submissions from 16 d- ferent countries, and from...
On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and...
cena: 203,13

 Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce Atluri, Vijay 9783540705666 Springer
Data and Applications Security XXII: 22nd Annual Ifip Wg 11.3 Working Conference on Data and Applications Security London, Uk, July 13-16, 2008, Proce

ISBN: 9783540705666 / Angielski / Miękka / 368 str.

ISBN: 9783540705666/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Atluri
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don, UK, July 13-16, 2008. This year's working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-quality research papers, which were selected from a total of 56 submissions after a rigorous reviewing process by the Program Committee members and...
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC) held in L- don,...
cena: 203,13

 Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings Borisov, Nikita 9783540706298 Springer
Privacy Enhancing Technologies: 8th International Symposium, Pets 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

ISBN: 9783540706298 / Angielski / Miękka / 254 str.

ISBN: 9783540706298/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikita Borisov
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a premier venue for publishing original research on privacy-enhancing technologies. PETS received 48 submissions, each of which wasreviewedbyatleastfourmembersoftheProgramCommittee.Thirteenwere accepted into the program, maintaining the selective and competitive nature of the event. The program also included a keynote address by Stuart Shapiro. A...
The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23 25,2008.This year completed the transition f...
cena: 203,13

 Host Identity Protocol (Hip): Towards the Secure Mobile Internet Gurtov, Andrei 9780470997901 John Wiley & Sons
Host Identity Protocol (Hip): Towards the Secure Mobile Internet

ISBN: 9780470997901 / Angielski / Twarda / 332 str.

ISBN: 9780470997901/Angielski/Twarda/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrei Gurtov
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF

One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol...

"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is...
cena: 448,53

 Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers Tsudik, Gene 9783540852292 Springer
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

ISBN: 9783540852292 / Angielski / Miękka / 346 str.

ISBN: 9783540852292/Angielski/Miękka/346 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gene Tsudik
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier...
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2...
cena: 203,13

 Computational Forensics: Second International Workshop, Iwcf 2008, Washington, DC, Usa, August 7-8, 2008, Proceedings Srihari, Sargur N. 9783540853022 Springer
Computational Forensics: Second International Workshop, Iwcf 2008, Washington, DC, Usa, August 7-8, 2008, Proceedings

ISBN: 9783540853022 / Angielski / Miękka / 229 str.

ISBN: 9783540853022/Angielski/Miękka/229 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sargur N. Srihari
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IWCF 2008), held August 7 8, 2008. It was a great honor for the organizers to host this scienti?c event at the renowned National Academy of Sciences: Keck Center in Washington, DC, USA. Computational Forensics is an emerging research domain focusing on the investigation of forensic problems using computational methods. Its primary goalis the discoveryand advancement of forensicknowledgeinvolving modeling, computer simulation, and computer-based...
This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the Second International Workshop on Computational Forensics (IW...
cena: 203,13

 Understanding and Applying Cryptography and Data Security Adam J. Elbirt 9781420061604 TAYLOR & FRANCIS LTD
Understanding and Applying Cryptography and Data Security

ISBN: 9781420061604 / Angielski / Twarda / 416 str.

ISBN: 9781420061604/Angielski/Twarda/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam J. Elbirt

Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with the construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic resource requirements, memory usage, speed, power consumption, and more. He includes many examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks...

Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and em...

cena: 694,06

 Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets Information Security 9780750679954 Butterworth-Heinemann
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

ISBN: 9780750679954 / Angielski / Miękka / 270 str.

ISBN: 9780750679954/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Mallery
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the "spy vs. spy" perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia" for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics...

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft ...
cena: 247,83

 Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection Wang, Yun 9781599047089 Information Science Reference
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

ISBN: 9781599047089 / Angielski / Twarda / 476 str.

ISBN: 9781599047089/Angielski/Twarda/476 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Wang
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
cena: 850,26

 Sequences and Their Applications - Seta 2008: 5th International Conference Lexington, Ky, Usa, September 14-18, 2008, Proceedings Golomb, Solomon W. 9783540859116 Springer
Sequences and Their Applications - Seta 2008: 5th International Conference Lexington, Ky, Usa, September 14-18, 2008, Proceedings

ISBN: 9783540859116 / Angielski / Miękka / 440 str.

ISBN: 9783540859116/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Solomon W. Golomb
This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, Kentucky (USA), September 14-18, 2008. The conference SETA is well est- lished in the mathematics and computer science community. Topics of "SETA" include - Randomness of sequences - Correlation (periodic and aperiodic types) and combinatorial aspects of - quences (di?erence sets) - Sequences with applications in coding theory and cryptography - Sequences over ?nite ?elds/rings/function ?elds - Linear and nonlinear feedback shift register...
This volume contains the refereed proceedings papers of the Fifth International ConferenceonSequencesandtheirApplications(SETA2008), heldinLexington, ...
cena: 203,13

 Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks Fry, Chris 9780596518165 O'Reilly Media
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

ISBN: 9780596518165 / Angielski / Miękka / 246 str.

ISBN: 9780596518165/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Nystrom; Chris Fry

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help...

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat...

cena: 187,81

 Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Macaulay, Tyson 9781439801963 Auerbach Publications
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

ISBN: 9781439801963 / Angielski / Twarda / 204 str.

ISBN: 9781439801963/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Macaulay Tyson

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the...

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services...

cena: 436,21

 The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Viega, John 9780596523022 O'Reilly Media
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

ISBN: 9780596523022 / Angielski / Miękka / 264 str.

ISBN: 9780596523022/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.

Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few...

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi...

cena: 116,19

 Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings Rafail Ostrovsky, Roberto de Prisco, Ivan Visconti 9783540858546 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings

ISBN: 9783540858546 / Angielski / Miękka / 423 str.

ISBN: 9783540858546/Angielski/Miękka/423 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafail Ostrovsky;Roberto de Prisco;Ivan Visconti
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, ...
cena: 580,94

 Securing Library Technology: A How-to-do-it Manual Paul W. Earp, Adam Wright 9781555706395 Neal-Schuman Publishers Inc
Securing Library Technology: A How-to-do-it Manual

ISBN: 9781555706395 / Angielski / Miękka / 245 str.

ISBN: 9781555706395/Angielski/Miękka/245 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul W. Earp;Adam Wright
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed...
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting y...
cena: 386,00

 Progress in Cryptology -- INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings Thomas Johansson, Subhamoy Maitra 9783540206095 Springer-Verlag Berlin and Heidelberg GmbH &
Progress in Cryptology -- INDOCRYPT 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings

ISBN: 9783540206095 / Angielski / Miękka / 436 str.

ISBN: 9783540206095/Angielski/Miękka/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Johansson;Subhamoy Maitra

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003.

The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and...

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India...

cena: 203,13

 Fuzzing for Software Security Testing and Quality Assurance Ari Takanen Jared D. Demott Charles Miller 9781596932142 Artech House Publishers
Fuzzing for Software Security Testing and Quality Assurance

ISBN: 9781596932142 / Angielski / Twarda / 312 str.

ISBN: 9781596932142/Angielski/Twarda/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ari Takanen; Jared D. Demott; Charles Miller
Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and patch flaws before harmful viruses, worms, and Trojans can rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice.
Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and...
cena: 410,35

 Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang 9783540333616 Springer-Verlag Berlin and Heidelberg GmbH &
Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings

ISBN: 9783540333616 / Angielski / Miękka / 188 str.

ISBN: 9783540333616/Angielski/Miękka/188 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen;Feiyue Wang;Christopher C. Yang
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice...
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and sy...
cena: 203,13

 Advances in Cryptology -- Asiacrypt 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai Lai, Xuejia 9783540494751 Springer
Advances in Cryptology -- Asiacrypt 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai

ISBN: 9783540494751 / Angielski / Miękka / 470 str.

ISBN: 9783540494751/Angielski/Miękka/470 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xuejia Lai; Kefei Chen

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.


This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Sec...

cena: 203,13

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia