• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings Ehud Gudes, Jaideep Vaidya 9783642030062 Springer-Verlag Berlin and Heidelberg GmbH &
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings

ISBN: 9783642030062 / Angielski / Miękka / 315 str.

ISBN: 9783642030062/Angielski/Miękka/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehud Gudes;Jaideep Vaidya
This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cordia University, Montreal, Canada, July 12 15, 2009. This year s working conference continued its tradition of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program consisting of 9 research paper s- sionswith 18 full researchpapers, and 4 shortpaperswhich were selected froma total of 47 submissions after a rigorous reviewing process by the...
This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cor...
cena: 201,24

 iNetSec 2009-Open Research Problems in Network Security Camenisch, Jan 9783642054365 Springer
iNetSec 2009-Open Research Problems in Network Security

ISBN: 9783642054365 / Angielski / Twarda / 168 str.

ISBN: 9783642054365/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch

This book constitutes the refereed post conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2009, held in Zurich, Switzerland, in April 2009.

The 14 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on involving humans; Web 2.0; protecting resources; pervasive devices; protocol security; and privacy.

This book constitutes the refereed post conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2009, held in Zurich, Switzerlan...

cena: 201,24

 Introduction to Cryptography with Mathematical Foundations and Computer Implementations Alexander Stanoyevitch   9781439817636 Taylor & Francis
Introduction to Cryptography with Mathematical Foundations and Computer Implementations

ISBN: 9781439817636 / Angielski / Twarda / 672 str.

ISBN: 9781439817636/Angielski/Twarda/672 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander Stanoyevitch

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed.

Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key...

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundation...

cena: 514,26

 Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers Charles Palmer, Sujeet Shenoi 9783642047978 Springer-Verlag Berlin and Heidelberg GmbH &
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

ISBN: 9783642047978 / Angielski / Twarda / 257 str.

ISBN: 9783642047978/Angielski/Twarda/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles Palmer;Sujeet Shenoi
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments,...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- ...
cena: 402,53

 Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings Jøsang, Audun 9783642047657 Springer
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings

ISBN: 9783642047657 / Angielski / Miękka / 301 str.

ISBN: 9783642047657/Angielski/Miękka/301 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Audun Ja Sang
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries - thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's...
The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic coun...
cena: 201,24

 Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Kiumi, Akingbehin 9783642102394 Springer
Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008.

ISBN: 9783642102394 / Angielski / Miękka / 176 str.

ISBN: 9783642102394/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Haeng-kon Kim

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008.

The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008).

This volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its ...

cena: 201,24

 Information Theoretic Security Desmedt, Yvo 9783642102295 Springer
Information Theoretic Security

ISBN: 9783642102295 / Angielski / Miękka / 211 str.

ISBN: 9783642102295/Angielski/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yvo Desmedt
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held on Awaji Island, Japan, October 16-19, 2005, as the 2005 IEEE Information T- ory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005, Japan). The General Chair of ICITS 2007, Javier Lopez, and the Organ- ing Committee were responsible for local organization, registration, etc. Modern unclassi?ed research on cryptography started with Shannon's work on cryptography using information theory. Since then we have seen several -...
ICITS 2007, the Second International Conference on Information Theoretic - curity, was held in Madrid, Spain, May 25-29, 2007. The ?rst one was held o...
cena: 201,24

 Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Jacobson, Michael J. 9783642054433 Springer
Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009 Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

ISBN: 9783642054433 / Angielski / Miękka / 465 str.

ISBN: 9783642054433/Angielski/Miękka/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jr. Michael J. Jacobson
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison...
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary, in Calgary, Alberta, Canada, during August 13-14...
cena: 201,24

 Cryptography Engineering: Design Principles and Practical Applications Tadayoshi (University of Washington, Seattle, WA) Kohno 9780470474242 John Wiley & Sons Inc
Cryptography Engineering: Design Principles and Practical Applications

ISBN: 9780470474242 / Angielski / Miękka / 384 str.

ISBN: 9780470474242/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
WA) Kohno Seattle Tadayoshi (University of Washington
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many...

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping in...

cena: 226,44

 Information and Communications Security: 11th International Conference, Icics 2009 Qing, Sihan 9783642111440 Springer
Information and Communications Security: 11th International Conference, Icics 2009

ISBN: 9783642111440 / Angielski / Miękka / 504 str.

ISBN: 9783642111440/Angielski/Miękka/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009. The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.
This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Be...
cena: 402,53

 Replication: Theory and Practice Charron-Bost, Bernadette 9783642112935 Springer
Replication: Theory and Practice

ISBN: 9783642112935 / Angielski / Miękka / 308 str.

ISBN: 9783642112935/Angielski/Miękka/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernadette Charron-Bost

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to a convergence of these different goals. The objective of this state-of-the-art survey is not to speculate about the future of replication, but rather to understand the present, to make an assessment of approximately 30 years of research on replication, and to present a comprehensive view...

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have tra...

cena: 301,89

 Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings Parker, Matthew G. 9783642108679 Springer
Cryptography and Coding: 12th Ima International Conference, Imacc 2009, Cirencester, Uk, December 15-17, 2009, Proceedings

ISBN: 9783642108679 / Angielski / Miękka / 495 str.

ISBN: 9783642108679/Angielski/Miękka/495 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew G. Parker
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009. The 26 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on coding theory, symmetric cryptography, security protocols, asymmetric cryptography, Boolean functions and side channels and implementations.
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Decembe...
cena: 402,53

 Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers Youm, Heung Youl 9783642108372 Springer
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

ISBN: 9783642108372 / Angielski / Miękka / 404 str.

ISBN: 9783642108372/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heung Youl Youm
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was ...
cena: 201,24

 Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings Roy, Bimal Kumar 9783642106279 Springer
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings

ISBN: 9783642106279 / Angielski / Miękka / 442 str.

ISBN: 9783642106279/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Sendrier

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi...

cena: 201,24

 Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin Datta, Anupam 9783642106217 Springer
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin

ISBN: 9783642106217 / Angielski / Miękka / 159 str.

ISBN: 9783642106217/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anupam Datta
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The...
cena: 201,24

 Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200 Slezak, Dominik 9783642105821 Springer
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200

ISBN: 9783642105821 / Angielski / Miękka / 185 str.

ISBN: 9783642105821/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dominik Slezak
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
cena: 201,24

 Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings Garay, Juan A. 9783642104329 Springer
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings

ISBN: 9783642104329 / Angielski / Miękka / 538 str.

ISBN: 9783642104329/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
cena: 402,53

 Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja Matsui, Mitsuri 9783642103650 Springer
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja

ISBN: 9783642103650 / Angielski / Miękka / 740 str.

ISBN: 9783642103650/Angielski/Miękka/740 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mitsuri Matsui
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi-...
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during Decemb...
cena: 201,24

 Information Systems, Technology and Management Prasad, Sushil K. 9783642120343 Not Avail
Information Systems, Technology and Management

ISBN: 9783642120343 / Angielski / Miękka / 434 str.

ISBN: 9783642120343/Angielski/Miękka/434 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil K. Prasad
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, h...
cena: 402,53

 Cyber Security: Deterrence and It Protection for Critical Infrastructures Martellini, Maurizio 9783319022789 Springer
Cyber Security: Deterrence and It Protection for Critical Infrastructures

ISBN: 9783319022789 / Angielski / Miękka / 72 str.

ISBN: 9783319022789/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurizio Martellini
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
cena: 201,24

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia