• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2741

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Kiumi, Akingbehin 9783642102394 Springer
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008.

ISBN: 9783642102394 / Angielski / Miękka / 176 str.

ISBN: 9783642102394/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Haeng-kon Kim

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008.

The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its ...

cena: 201,72 zł

 Information Theoretic Security Desmedt, Yvo 9783642102295 Springer
Information Theoretic Security

ISBN: 9783642102295 / Angielski / Miękka / 211 str.

ISBN: 9783642102295/Angielski/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yvo Desmedt
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information T- ory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005, Japan). The General Chair of ICITS 2007, Javier Lopez, and the Organ- ing Committee were responsible for local organization, registration, etc. Modern unclassi?ed research on cryptography started with Shannon's work on cryptography using information theory. Since then we have seen several -...
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held o...
cena: 201,72 zł

 Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Jacobson, Michael J. 9783642054433 Springer
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

ISBN: 9783642054433 / Angielski / Miękka / 465 str.

ISBN: 9783642054433/Angielski/Miękka/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jr. Michael J. Jacobson
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison...
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14...
cena: 201,72 zł

 Cryptography Engineering: Design Principles and Practical Applications Tadayoshi (University of Washington, Seattle, WA) Kohno 9780470474242 John Wiley & Sons Inc
Cryptography Engineering: Design Principles and Practical Applications

ISBN: 9780470474242 / Angielski / Miękka / 384 str.

ISBN: 9780470474242/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
WA) Kohno Seattle Tadayoshi (University of Washington
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many...

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping in...

cena: 226,98 zł

 Information and Communications Security: 11th International Conference, Icics 2009 Qing, Sihan 9783642111440 Springer
Information and Communications Security: 11th International Conference, Icics 2009

ISBN: 9783642111440 / Angielski / Miękka / 504 str.

ISBN: 9783642111440/Angielski/Miękka/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009. The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Be...
cena: 403,47 zł

 Replication: Theory and Practice Charron-Bost, Bernadette 9783642112935 Springer
Replication: Theory and Practice

ISBN: 9783642112935 / Angielski / Miękka / 308 str.

ISBN: 9783642112935/Angielski/Miękka/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernadette Charron-Bost

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different goals. The objective of this state-of-the-art survey is not to speculate about the future of replication, but rather to understand the present, to make an assessment of approximately 30 years of research on replication, and to present a comprehensive view...

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have tra...

cena: 302,60 zł

 Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings Parker, Matthew G. 9783642108679 Springer
Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings

ISBN: 9783642108679 / Angielski / Miękka / 495 str.

ISBN: 9783642108679/Angielski/Miękka/495 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew G. Parker
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009. The 26 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on coding theory, symmetric cryptography, security protocols, asymmetric cryptography, Boolean functions and side channels and implementations.
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Decembe...
cena: 403,47 zł

 Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers Youm, Heung Youl 9783642108372 Springer
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

ISBN: 9783642108372 / Angielski / Miękka / 404 str.

ISBN: 9783642108372/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heung Youl Youm
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was ...
cena: 201,72 zł

 Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings Roy, Bimal Kumar 9783642106279 Springer
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings

ISBN: 9783642106279 / Angielski / Miękka / 442 str.

ISBN: 9783642106279/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Sendrier

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi...

cena: 201,72 zł

 Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin Datta, Anupam 9783642106217 Springer
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin

ISBN: 9783642106217 / Angielski / Miękka / 159 str.

ISBN: 9783642106217/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anupam Datta
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The...
cena: 201,72 zł

 Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200 Slezak, Dominik 9783642105821 Springer
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200

ISBN: 9783642105821 / Angielski / Miękka / 185 str.

ISBN: 9783642105821/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dominik Slezak
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
cena: 201,72 zł

 Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings Garay, Juan A. 9783642104329 Springer
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings

ISBN: 9783642104329 / Angielski / Miękka / 538 str.

ISBN: 9783642104329/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
cena: 403,47 zł

 Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja Matsui, Mitsuri 9783642103650 Springer
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja

ISBN: 9783642103650 / Angielski / Miękka / 740 str.

ISBN: 9783642103650/Angielski/Miękka/740 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mitsuri Matsui
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi-...
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during Decemb...
cena: 201,72 zł

 Information Systems, Technology and Management Prasad, Sushil K. 9783642120343 Not Avail
Information Systems, Technology and Management

ISBN: 9783642120343 / Angielski / Miękka / 434 str.

ISBN: 9783642120343/Angielski/Miękka/434 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil K. Prasad
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, h...
cena: 403,47 zł

 Cyber Security: Deterrence and It Protection for Critical Infrastructures Martellini, Maurizio 9783319022789 Springer
Cyber Security: Deterrence and It Protection for Critical Infrastructures

ISBN: 9783319022789 / Angielski / Miękka / 72 str.

ISBN: 9783319022789/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurizio Martellini
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
cena: 201,72 zł

 Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings Bandyopadhyay, Samir Kumar 9783642133640 Not Avail
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings

ISBN: 9783642133640 / Angielski / Miękka / 350 str.

ISBN: 9783642133640/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Samir Kumar Bandyopadhyay; Wael Adi; Tai-hoon Kim
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This...
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli-...
cena: 201,72 zł

 Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings Chen, Hsinchun 9783642136009 Not Avail
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings

ISBN: 9783642136009 / Angielski / Miękka / 183 str.

ISBN: 9783642136009/Angielski/Miękka/183 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen; Michael Chau; Shu-Hsing Li
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
cena: 201,72 zł

 Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings Foresti, Sara 9783642137389 Not Avail
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings

ISBN: 9783642137389 / Angielski / Miękka / 376 str.

ISBN: 9783642137389/Angielski/Miękka/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti; Sushil Jajodia
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June...
cena: 201,72 zł

 Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings Acquisti, Alessandro 9783642138683 Not Avail
Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings

ISBN: 9783642138683 / Angielski / Miękka / 441 str.

ISBN: 9783642138683/Angielski/Miękka/441 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Acquisti; Sean W. Smith; Ahmad-Reza Sadeghi
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21 23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two di?erent tracks:...
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel ...
cena: 201,72 zł

 Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer 9783642407789 Springer-Verlag Berlin and Heidelberg GmbH &
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings

ISBN: 9783642407789 / Angielski / Miękka / 249 str.

ISBN: 9783642407789/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart De Decker;Jana Dittmann;Christian Kraetzer
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security...
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 201,72 zł

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia