• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers Youm, Heung Youl 9783642108372 Springer
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

ISBN: 9783642108372 / Angielski / Miękka / 404 str.

ISBN: 9783642108372/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heung Youl Youm
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was ...
cena: 201,24

 Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings Roy, Bimal Kumar 9783642106279 Springer
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings

ISBN: 9783642106279 / Angielski / Miękka / 442 str.

ISBN: 9783642106279/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Sendrier

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi...

cena: 201,24

 Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin Datta, Anupam 9783642106217 Springer
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin

ISBN: 9783642106217 / Angielski / Miękka / 159 str.

ISBN: 9783642106217/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anupam Datta
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The...
cena: 201,24

 Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200 Slezak, Dominik 9783642105821 Springer
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200

ISBN: 9783642105821 / Angielski / Miękka / 185 str.

ISBN: 9783642105821/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dominik Slezak
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
cena: 201,24

 Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings Garay, Juan A. 9783642104329 Springer
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings

ISBN: 9783642104329 / Angielski / Miękka / 538 str.

ISBN: 9783642104329/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
cena: 402,53

 Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja Matsui, Mitsuri 9783642103650 Springer
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja

ISBN: 9783642103650 / Angielski / Miękka / 740 str.

ISBN: 9783642103650/Angielski/Miękka/740 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mitsuri Matsui
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi-...
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during Decemb...
cena: 201,24

 Information Systems, Technology and Management Prasad, Sushil K. 9783642120343 Not Avail
Information Systems, Technology and Management

ISBN: 9783642120343 / Angielski / Miękka / 434 str.

ISBN: 9783642120343/Angielski/Miękka/434 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil K. Prasad
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, h...
cena: 402,53

 Cyber Security: Deterrence and It Protection for Critical Infrastructures Martellini, Maurizio 9783319022789 Springer
Cyber Security: Deterrence and It Protection for Critical Infrastructures

ISBN: 9783319022789 / Angielski / Miękka / 72 str.

ISBN: 9783319022789/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurizio Martellini
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
cena: 201,24

 Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings Bandyopadhyay, Samir Kumar 9783642133640 Not Avail
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings

ISBN: 9783642133640 / Angielski / Miękka / 350 str.

ISBN: 9783642133640/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Samir Kumar Bandyopadhyay; Wael Adi; Tai-hoon Kim
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This...
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli-...
cena: 201,24

 Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings Chen, Hsinchun 9783642136009 Not Avail
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings

ISBN: 9783642136009 / Angielski / Miękka / 183 str.

ISBN: 9783642136009/Angielski/Miękka/183 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen; Michael Chau; Shu-Hsing Li
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
cena: 201,24

 Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings Foresti, Sara 9783642137389 Not Avail
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings

ISBN: 9783642137389 / Angielski / Miękka / 376 str.

ISBN: 9783642137389/Angielski/Miękka/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti; Sushil Jajodia
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June...
cena: 201,24

 Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings Acquisti, Alessandro 9783642138683 Not Avail
Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings

ISBN: 9783642138683 / Angielski / Miękka / 441 str.

ISBN: 9783642138683/Angielski/Miękka/441 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Acquisti; Sean W. Smith; Ahmad-Reza Sadeghi
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21 23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two di?erent tracks:...
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel ...
cena: 201,24

 Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer 9783642407789 Springer-Verlag Berlin and Heidelberg GmbH &
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings

ISBN: 9783642407789 / Angielski / Miękka / 249 str.

ISBN: 9783642407789/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart De Decker;Jana Dittmann;Christian Kraetzer
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security...
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 201,24

 Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, Augu Abdalla, Michel 9783642147111 Not Avail
Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, Augu

ISBN: 9783642147111 / Angielski / Miękka / 323 str.

ISBN: 9783642147111/Angielski/Miękka/323 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla; Paulo S. L. M. Barreto
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010.
The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, ...
cena: 201,24

 Towards Trustworthy Elections: New Directions in Electronic Voting Chaum, David 9783642129797 Not Avail
Towards Trustworthy Elections: New Directions in Electronic Voting

ISBN: 9783642129797 / Angielski / Miękka / 403 str.

ISBN: 9783642129797/Angielski/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chaum; Markus Jakobsson; Ronald L. Rivest
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade....
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology ca...
cena: 201,24

 Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding Kreibich, Christian 9783642142147 Not Avail
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding

ISBN: 9783642142147 / Angielski / Miękka / 219 str.

ISBN: 9783642142147/Angielski/Miękka/219 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christian Kreibich; Marko Jahnke
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2010, held in Bonn, Germany, in July 2010. This book features the papers that are organized in topical sections on host security, trends, vulnerabilities, intrusion detection and web security.
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2...
cena: 201,24

 Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2 Bezzi, Michele 9783642142819 Not Avail
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2

ISBN: 9783642142819 / Angielski / Twarda / 314 str.

ISBN: 9783642142819/Angielski/Twarda/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michele Bezzi; Penny Duquenoy; Simone Fischer-Hubner
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies andthepeopleresponsible for making decisions about them, designing, and implementing them scarcely consider those requirements, thereby potentially putting individuals privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may...
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain c...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security V Yun Q. Shi 9783642142970 Not Avail
Transactions on Data Hiding and Multimedia Security V

ISBN: 9783642142970 / Angielski / Miękka / 129 str.

ISBN: 9783642142970/Angielski/Miękka/129 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,24

 Rc4 Stream Cipher and Its Variants Paul, Goutam 9781439831359 Taylor and Francis
Rc4 Stream Cipher and Its Variants

ISBN: 9781439831359 / Angielski / Twarda / 311 str.

ISBN: 9781439831359/Angielski/Twarda/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Goutam Paul;Subhamoy Maitra;¬Abar

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.

After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute...

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive experti...

cena: 881,59

 Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers Wirsing, Martin 9783642156397 Not Avail
Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers

ISBN: 9783642156397 / Angielski / Miękka / 380 str.

ISBN: 9783642156397/Angielski/Miękka/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Wirsing; Martin Hofmann; Axel Rauschmayer
Global computing refers to computation over "global computers," i.e., com- tational infrastructures available globally and able to provide uniform services with variable guarantees for communication, cooperation and mobility, resource usage, security policies and mechanisms, etc., with particular regard to explo- ing their universal scale and the programmability of their services. As the scope and computational power of such global infrastructures continue to grow, it - comes more and more important to develop methods, theories and techniques for trustworthy systems running on global...
Global computing refers to computation over "global computers," i.e., com- tational infrastructures available globally and able to provide uniform ser...
cena: 201,24

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia