• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Fast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings Dieter Gollmann 9783540608653 Springer-Verlag Berlin and Heidelberg GmbH &
Fast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings

ISBN: 9783540608653 / Angielski / Miękka / 225 str.

ISBN: 9783540608653/Angielski/Miękka/225 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dieter Gollmann
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation...
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction ...
cena: 201,24

 Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings Varadharajan, Vijav 9783540632320 Springer
Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings

ISBN: 9783540632320 / Angielski / Miękka / 343 str.

ISBN: 9783540632320/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijav Varadharajan; Josef Pieprzyk; Yi Mu
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NS...
cena: 201,24

 Fast Software Encryption: 4th International Workshop, Fse'97, Haifa, Israel, January 20-22, 1997, Proceedings Biham, Eli 9783540632474 Springer
Fast Software Encryption: 4th International Workshop, Fse'97, Haifa, Israel, January 20-22, 1997, Proceedings

ISBN: 9783540632474 / Angielski / Miękka / 299 str.

ISBN: 9783540632474/Angielski/Miękka/299 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eli Biham
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast...
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held...
cena: 201,24

 Information Security and Cryptology - Icisc 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Won, Dongho 9783540333548 Springer
Information Security and Cryptology - Icisc 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

ISBN: 9783540333548 / Angielski / Miękka / 458 str.

ISBN: 9783540333548/Angielski/Miękka/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongho Won; Seungjoo Kim

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005. The 32 revised full papers presented together with two invited talks are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography.


This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 200...

cena: 201,24

 Digital Watermarking: 5th International Workshop, Iwdw 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings Shi, Yun Qing 9783540488255 Springer
Digital Watermarking: 5th International Workshop, Iwdw 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings

ISBN: 9783540488255 / Angielski / Miękka / 476 str.

ISBN: 9783540488255/Angielski/Miękka/476 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Qing Shi; Byeungwoo Jeon
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was Meet the Challenges in this Digital World As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize...
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it h...
cena: 201,24

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9780387772677 SPRINGER-VERLAG NEW YORK INC.
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9780387772677 / Angielski / Twarda / 371 str.

ISBN: 9780387772677/Angielski/Twarda/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 603,81

 Computer Security - Esorics 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings de Capitani Di Vimercati, Sabrina 9783540289630 Springer
Computer Security - Esorics 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings

ISBN: 9783540289630 / Angielski / Miękka / 516 str.

ISBN: 9783540289630/Angielski/Miękka/516 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Capitani Di Vimercati S. De; Sabrina de Capitani Di Vimercati
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12 14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm-...
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security I Yun Q. Shi 9783540490715 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security I

ISBN: 9783540490715 / Angielski / Miękka / 139 str.

ISBN: 9783540490715/Angielski/Miękka/139 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,24

 Mobile Ad-Hoc and Sensor Networks: Second International Conference, Msn 2006, Hong Kong, China, December 13-15, 2006, Proceedings Cao, Jiannong 9783540499329 Springer
Mobile Ad-Hoc and Sensor Networks: Second International Conference, Msn 2006, Hong Kong, China, December 13-15, 2006, Proceedings

ISBN: 9783540499329 / Angielski / Miękka / 892 str.

ISBN: 9783540499329/Angielski/Miękka/892 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jiannong Cao; Ivan Stojmenovic; Xiaohua Jia

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, security, energy efficiency, data processing, and deployment.


This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong ...

cena: 402,53

 Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings Stajano, Frank 9783540732747 Springer
Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings

ISBN: 9783540732747 / Angielski / Miękka / 250 str.

ISBN: 9783540732747/Angielski/Miękka/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine Meadows
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We...
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd...
cena: 201,24

 Pairing-Based Cryptography - Pairing 2007: First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings Takagi, Tsuyoshi 9783540734888 Springer
Pairing-Based Cryptography - Pairing 2007: First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings

ISBN: 9783540734888 / Angielski / Miękka / 410 str.

ISBN: 9783540734888/Angielski/Miękka/410 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tatsuaki Okamoto

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007. The 18 revised full papers presented together were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections including those on applications, and certificateless public key encryption.


Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, be...

cena: 201,24

 Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro Hämmerli, Bernhard 9783540736134 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro

ISBN: 9783540736134 / Angielski / Miękka / 254 str.

ISBN: 9783540736134/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer
organized by Lexi Pimenidis of RWTH Aachen.
organized by Lexi Pimenidis of RWTH Aachen.
cena: 201,24

 Encryption for Digital Content Aggelos Kiayias Serdar Pehlivanglu 9781441900432 Springer
Encryption for Digital Content

ISBN: 9781441900432 / Angielski / Twarda / 209 str.

ISBN: 9781441900432/Angielski/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Serdar Pehlivanglu

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth...

cena: 402,53

 Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, Usa, March 18-20, 2009 Jarecki, Stanislaw 9783642004674 Springer
Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, Usa, March 18-20, 2009

ISBN: 9783642004674 / Angielski / Miękka / 526 str.

ISBN: 9783642004674/Angielski/Miękka/526 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stanislaw Jarecki
It has been a real pleasure to have taken part in organizing the 12th Inter- tional Conference on Practice and Theory in Public Key Cryptography (PKC 2009). PKC 2009 was held March 18-20, 2009, on the campus of the Univ- sity of California, Irvine (UCI). As usual, it was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with: - UCI Secure Computing and Networking Center (SCONCE) - UCI Donald Bren School of Information and Computer Sciences (DBSICS) - California Institute for Telecommunications and Information Technology (CalIT2) The PKC 2008 Program...
It has been a real pleasure to have taken part in organizing the 12th Inter- tional Conference on Practice and Theory in Public Key Cryptography (PKC ...
cena: 201,24

 Topics in Cryptology - Ct-Rsa 2009: The Cryptographers' Track at the Rsa Conference 2009, San Francisco, Ca, Usa, April 20-24, 2009, Proceedings Fischlin, Marc 9783642008610 Springer
Topics in Cryptology - Ct-Rsa 2009: The Cryptographers' Track at the Rsa Conference 2009, San Francisco, Ca, Usa, April 20-24, 2009, Proceedings

ISBN: 9783642008610 / Angielski / Miękka / 482 str.

ISBN: 9783642008610/Angielski/Miękka/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Fischlin
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and...
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security IV Yun Q. Shi 9783642017568 Springer
Transactions on Data Hiding and Multimedia Security IV

ISBN: 9783642017568 / Angielski / Miękka / 103 str.

ISBN: 9783642017568/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
This volume covers digital watermarking. It deals with robust watermarking, introduces a new least distortion linear gain model for halftone image watermarking, and presents an optimal histogram pair based image reversible data hiding scheme.
This volume covers digital watermarking. It deals with robust watermarking, introduces a new least distortion linear gain model for halftone image wat...
cena: 201,24

 Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings Abdalla, Michel 9783642019562 Springer
Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

ISBN: 9783642019562 / Angielski / Miękka / 535 str.

ISBN: 9783642019562/Angielski/Miękka/535 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla
ACNS2009, the7thInternationalConferenceonAppliedCryptographyandN- work Security, was held in Paris-Rocquencourt, France, June 2-5, 2009. ACNS 2009 was organized by the Ecole Normale Sup erieure (ENS), the French - tional Center for Scienti?c Research (CNRS), and the French National Institute for Researchin Computer Science andControl(INRIA), in cooperationwith the InternationalAssociation for CryptologicResearch(IACR). The General Chairs of the conference were Pierre-Alain Fouque and Damien Vergnaud. Theconferencereceived150submissionsandeachsubmissionwasassignedto at least three committee...
ACNS2009, the7thInternationalConferenceonAppliedCryptographyandN- work Security, was held in Paris-Rocquencourt, France, June 2-5, 2009. ACNS 2009 was...
cena: 201,24

 Group Theoretic Cryptography Maria Isabel Vasco Spyros Magliveras Rainer Steinwandt 9781584888369 Taylor & Francis
Group Theoretic Cryptography

ISBN: 9781584888369 / Angielski / Twarda / 244 str.

ISBN: 9781584888369/Angielski/Twarda/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria Isabel Vasco;Spyros Magliveras;Rainer Steinwandt

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future.
Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an...

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the l...

cena: 587,73

 Coding and Cryptology: Second International Workshop, Iwcc 2009 Chee, Yeow Meng 9783642018138 Springer
Coding and Cryptology: Second International Workshop, Iwcc 2009

ISBN: 9783642018138 / Angielski / Miękka / 275 str.

ISBN: 9783642018138/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yeow Meng Chee
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian...
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy...
cena: 201,24

 Forensics in Telecommunications, Information and Multimedia: Second International Conference, E-Forensics 2009, Adelaide, Australia, January 19-21, 20 Sorell, Matthew 9783642023118 Springer
Forensics in Telecommunications, Information and Multimedia: Second International Conference, E-Forensics 2009, Adelaide, Australia, January 19-21, 20

ISBN: 9783642023118 / Angielski / Miękka / 224 str.

ISBN: 9783642023118/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew Sorell
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the...
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took ...
cena: 201,24

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia