• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers Ahmad-Reza Sadeghi 9783642398834 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

ISBN: 9783642398834 / Angielski / Miękka / 406 str.

ISBN: 9783642398834/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ahmad-Reza Sadeghi
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Secu...
cena: 201,24

 Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings Jason Crampton, Sushil Jajodia, Keith Mayes 9783642402029 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings

ISBN: 9783642402029 / Angielski / Miękka / 794 str.

ISBN: 9783642402029/Angielski/Miękka/794 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jason Crampton;Sushil Jajodia;Keith Mayes

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in...

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2...

cena: 201,24

 Cryptographic Hardware and Embedded Systems -- CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings Guido Marco Bertoni, Jean-Sébastien Coron 9783642403484 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptographic Hardware and Embedded Systems -- CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

ISBN: 9783642403484 / Angielski / Miękka / 490 str.

ISBN: 9783642403484/Angielski/Miękka/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guido Marco Bertoni;Jean-Sébastien Coron
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barb...
cena: 201,24

 Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon 9783642376818 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

ISBN: 9783642376818 / Angielski / Miękka / 512 str.

ISBN: 9783642376818/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Taekyoung Kwon;Mun-Kyu Lee;Daesung Kwon
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic...
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology,...
cena: 201,24

 Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce Soldek, Jerzy 9781461348474 Springer
Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce

ISBN: 9781461348474 / Angielski / Miękka / 302 str.

ISBN: 9781461348474/Angielski/Miękka/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Soldek; Leszek Drobiazgiewicz
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety...

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice an...
cena: 603,81

 Synchronizing E-Security Godfried B. Williams Godfried B 9781461351047 Springer
Synchronizing E-Security

ISBN: 9781461351047 / Angielski / Miękka / 96 str.

ISBN: 9781461351047/Angielski/Miękka/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Godfried B. Williams; Godfried B. Williams
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on...
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electro...
cena: 402,53

 Recent Advances in Rsa Cryptography Katzenbeisser, Stefan 9781461355502 Springer
Recent Advances in Rsa Cryptography

ISBN: 9781461355502 / Angielski / Miękka / 140 str.

ISBN: 9781461355502/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Katzenbeisser
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against...
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emp...
cena: 402,53

 Elliptic Curves and Their Applications to Cryptography: An Introduction Andreas Enge Andreas Englishge 9781461373728 Springer
Elliptic Curves and Their Applications to Cryptography: An Introduction

ISBN: 9781461373728 / Angielski / Miękka / 164 str.

ISBN: 9781461373728/Angielski/Miękka/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Enge; Andreas Englishge
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the...
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
cena: 925,87

 Predictive Modular Neural Networks: Applications to Time Series Petridis, Vassilios 9781461375401 Springer
Predictive Modular Neural Networks: Applications to Time Series

ISBN: 9781461375401 / Angielski / Miękka / 314 str.

ISBN: 9781461375401/Angielski/Miękka/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vassilios Petridis; Athanasios Kehagias
The subject of this book is predictive modular neural networks and their ap- plication to time series problems: classification, prediction and identification. The intended audience is researchers and graduate students in the fields of neural networks, computer science, statistical pattern recognition, statistics, control theory and econometrics. Biologists, neurophysiologists and medical engineers may also find this book interesting. In the last decade the neural networks community has shown intense interest in both modular methods and time series problems. Similar interest has been expressed...
The subject of this book is predictive modular neural networks and their ap- plication to time series problems: classification, prediction and identif...
cena: 402,53

 Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings Robert H. Deng, Tao Feng 9783642380327 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings

ISBN: 9783642380327 / Angielski / Miękka / 388 str.

ISBN: 9783642380327/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert H. Deng;Tao Feng

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.


This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, hel...

cena: 201,24

 Advances in Cryptology - Eurocrypt 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Gree Johansson, Thomas 9783642383472 Springer
Advances in Cryptology - Eurocrypt 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Gree

ISBN: 9783642383472 / Angielski / Miękka / 736 str.

ISBN: 9783642383472/Angielski/Miękka/736 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Johansson; Phong Nguyen
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYP...
cena: 201,24

 Dynamic Secrets in Communication Security Sheng Xiao Weibo Gong Donald Towsley 9781461478300 Springer
Dynamic Secrets in Communication Security

ISBN: 9781461478300 / Angielski / Twarda / 136 str.

ISBN: 9781461478300/Angielski/Twarda/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sheng Xiao; Weibo Gong; Donald Towsley
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a...
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a compl...
cena: 201,24

 Security for Cloud Storage Systems Xiaohua Jia Kan Yang 9781461478720 Springer
Security for Cloud Storage Systems

ISBN: 9781461478720 / Angielski / Miękka / 83 str.

ISBN: 9781461478720/Angielski/Miękka/83 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xiaohua Jia; Kan Yang

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the...

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm o...

cena: 160,99

 Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings Fernandez-Gago, Carmen 9783642383229 Springer
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings

ISBN: 9783642383229 / Angielski / Twarda / 288 str.

ISBN: 9783642383229/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carmen Fernandez-Gago; Fabio Martinelli; Siani Pearson
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spa...
cena: 201,24

 Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers Kutylowski, Miroslaw 9783642385186 Springer
Information Security and Cryptology: 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers

ISBN: 9783642385186 / Angielski / Miękka / 393 str.

ISBN: 9783642385186/Angielski/Miękka/393 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miroslaw Kutylowski; Moti Yung
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, ...
cena: 201,24

 Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th Ifip Wg 11.2 International Workshop, Wist 2013, Heraklion Cavallaro, Lorenzo 9783642385292 Springer
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th Ifip Wg 11.2 International Workshop, Wist 2013, Heraklion

ISBN: 9783642385292 / Angielski / Miękka / 145 str.

ISBN: 9783642385292/Angielski/Miękka/145 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lorenzo Cavallaro; Dieter Gollmann
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security...
cena: 201,24

 Progress in Cryptology -- Africacrypt 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings Youssef, Amr 9783642385520 Springer
Progress in Cryptology -- Africacrypt 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, Proceedings

ISBN: 9783642385520 / Angielski / Miękka / 453 str.

ISBN: 9783642385520/Angielski/Miękka/453 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amr Youssef; Abderrahmane Nitaj; Aboul Ella Hassanien
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa...
cena: 201,24

 Post-Quantum Cryptography: 5th International Workshop, Pqcrypto 2013, Limoges, France, June 4-7, 2013, Proceedings Gaborit, Philippe 9783642386152 Springer
Post-Quantum Cryptography: 5th International Workshop, Pqcrypto 2013, Limoges, France, June 4-7, 2013, Proceedings

ISBN: 9783642386152 / Angielski / Miękka / 259 str.

ISBN: 9783642386152/Angielski/Miękka/259 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philippe Gaborit
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France,...
cena: 201,24

 Network and System Security: 7th International Conference, Nss 2013, Madrid, Spain, June 3-4, 2013, Proceedings Lopez, Javier 9783642386305 Springer
Network and System Security: 7th International Conference, Nss 2013, Madrid, Spain, June 3-4, 2013, Proceedings

ISBN: 9783642386305 / Angielski / Miękka / 793 str.

ISBN: 9783642386305/Angielski/Miękka/793 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Javier Lopez; Xinyi Huang; Ravi Sandhu
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems;...
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 201...
cena: 201,24

 Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela Urszula Ogiela 9781447150152 Springer
Secure Information Management Using Linguistic Threshold Approach

ISBN: 9781447150152 / Angielski / Twarda / 136 str.

ISBN: 9781447150152/Angielski/Twarda/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marek R. Ogiela; Urszula Ogiela
This text details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution.
This text details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models o...
cena: 201,24

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia