• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Preserving Privacy in On-Line Analytical Processing (Olap) Wang, Lingyu 9781441942784 Springer
Preserving Privacy in On-Line Analytical Processing (Olap)

ISBN: 9781441942784 / Angielski / Miękka / 180 str.

ISBN: 9781441942784/Angielski/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lingyu Wang; Sushil Jajodia; Duminda Wijesekera

Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding...

Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OL...

cena: 523,30

 Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings López, Javier 9783642215537 Springer
Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings

ISBN: 9783642215537 / Angielski / Miękka / 568 str.

ISBN: 9783642215537/Angielski/Miękka/568 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Javier L. Pez; Gene Tsudik
Constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, that was held in Nerja, Spain.
Constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, that was held in Ner...
cena: 201,24

 Progress in Cryptology - AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings Nitaj, Abderrahmane 9783642219689 Springer
Progress in Cryptology - AFRICACRYPT 2011: 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings

ISBN: 9783642219689 / Angielski / Miękka / 387 str.

ISBN: 9783642219689/Angielski/Miękka/387 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abderrahmane Nitaj; David Pointcheval
Constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. This book features the papers that are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, and security proofs.
Constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
cena: 201,24

 Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe 9783642221361 Springer-Verlag Berlin and Heidelberg GmbH &
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

ISBN: 9783642221361 / Angielski / Miękka / 257 str.

ISBN: 9783642221361/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson;James Malcolm;Vashek Matyas
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an...
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, U...
cena: 201,24

 Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings Parampalli, Udaya 9783642224966 Springer
Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings

ISBN: 9783642224966 / Angielski / Miękka / 464 str.

ISBN: 9783642224966/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Udaya Parampalli; Philip Hawkes
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne,...
cena: 201,24

 Public Key Infrastructures, Services and Applications: 7th European Workshop, Europki 2010, Athens, Greece, September 23-24, 2010. Revised Selected Pa Camenisch, Jan 9783642226328 Springer
Public Key Infrastructures, Services and Applications: 7th European Workshop, Europki 2010, Athens, Greece, September 23-24, 2010. Revised Selected Pa

ISBN: 9783642226328 / Angielski / Miękka / 209 str.

ISBN: 9783642226328/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Costas Lambrinoudakis
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and App...
cena: 201,24

 Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder 9783642214233 Springer-Verlag Berlin and Heidelberg GmbH &
Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings

ISBN: 9783642214233 / Angielski / Twarda / 330 str.

ISBN: 9783642214233/Angielski/Twarda/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Simone Fischer-Hubner;Yuko Murayama
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion...
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switze...
cena: 201,24

 Information Security and Cryptology Lai, Xuejia 9783642215179 Springer
Information Security and Cryptology

ISBN: 9783642215179 / Angielski / Miękka / 524 str.

ISBN: 9783642215179/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xuejia Lai; Moti Yung; Dongdai Lin
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, ...
cena: 201,24

 Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings Simone Fischer-Hübner, Nicholas Hopper 9783642222627 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings

ISBN: 9783642222627 / Angielski / Miękka / 285 str.

ISBN: 9783642222627/Angielski/Miękka/285 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner;Nicholas Hopper

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business,...

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 r...

cena: 201,24

 Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing 9783642209000 Springer-Verlag Berlin and Heidelberg GmbH &
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings

ISBN: 9783642209000 / Angielski / Miękka / 295 str.

ISBN: 9783642209000/Angielski/Miękka/295 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yeow Meng Chee;Zhenbo Guo;San Ling
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. This title covers a range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2...
cena: 201,24

 Security and the Networked Society Mark Gregory David Glance 9783319023892 Springer
Security and the Networked Society

ISBN: 9783319023892 / Angielski / Twarda / 297 str.

ISBN: 9783319023892/Angielski/Twarda/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Gregory; David Glance
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society....
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a...
cena: 201,24

 Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings Accorsi, Rafael 9783642410970 Springer
Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings

ISBN: 9783642410970 / Angielski / Miękka / 235 str.

ISBN: 9783642410970/Angielski/Miękka/235 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafael Accorsi; Silvio Ranise
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in Sep...
cena: 185,18

 Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers Souhwan Jung, Moti Yung 9783642278891 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

ISBN: 9783642278891 / Angielski / Miękka / 271 str.

ISBN: 9783642278891/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Souhwan Jung;Moti Yung
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA ...
cena: 201,24

 Digital Identity and Access Management: Technologies and Frameworks Sharman, Raj 9781613504987 Business Science Reference
Digital Identity and Access Management: Technologies and Frameworks

ISBN: 9781613504987 / Angielski / Twarda / 428 str.

ISBN: 9781613504987/Angielski/Twarda/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raj Sharman;Sanjukta Das Smith;Manish Gupta
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
cena: 999,40

 Advances in Cryptology - ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, So Lee, Dong Hoon 9783642253843 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology - ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, So

ISBN: 9783642253843 / Angielski / Miękka / 760 str.

ISBN: 9783642253843/Angielski/Miękka/760 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dong Hoon Lee;Xiaoyun Wang
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature;...
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIAC...
cena: 201,24

 Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Danezis, George 9783642275753 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected

ISBN: 9783642275753 / Angielski / Miękka / 332 str.

ISBN: 9783642275753/Angielski/Miękka/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Danezis
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and...
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Secu...
cena: 201,24

 Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner 9783642224430 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

ISBN: 9783642224430 / Angielski / Miękka / 271 str.

ISBN: 9783642224430/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jorge Cuellar;Javier Lopez;Gilles Barthe
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010...
cena: 201,24

 Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings Qing, Sihan 9783642252426 Springer-Verlag Berlin and Heidelberg GmbH &
Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings

ISBN: 9783642252426 / Angielski / Miękka / 432 str.

ISBN: 9783642252426/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing;Willy Susilo;Guilin Wang
Constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
Constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, Chi...
cena: 201,24

 Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011, Proceedings Yang, Bo-Yin 9783642254048 Springer-Verlag Berlin and Heidelberg GmbH &
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011, Proceedings

ISBN: 9783642254048 / Angielski / Miękka / 295 str.

ISBN: 9783642254048/Angielski/Miękka/295 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bo-Yin Yang
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era.
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, ...
cena: 201,24

 Security for Wireless Sensor Networks Using Identity-Based Cryptography Patil, Harsh Kupwade 9781439869017 Auerbach Publications
Security for Wireless Sensor Networks Using Identity-Based Cryptography

ISBN: 9781439869017 / Angielski / Twarda / 232 str.

ISBN: 9781439869017/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harsh Kupwade Patil; Stephen A. Szygenda

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer...

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele...

cena: 710,17

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia