• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings Abdalla, Michel 9783319029368 Springer
Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings

ISBN: 9783319029368 / Angielski / Miękka / 349 str.

ISBN: 9783319029368/Angielski/Miękka/349 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla; Cristina Nita-Rotaru; Ricardo Dahab

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.


This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, ...

cena: 201,24

 Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers Shi, Yun Q. 9783642400988 Springer
Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers

ISBN: 9783642400988 / Angielski / Miękka / 536 str.

ISBN: 9783642400988/Angielski/Miękka/536 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi; Fernando Perez-Gonzalez; Hyoung Joong Kim
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, he...
cena: 201,24

 Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re Peterson, Gilbert 9783642269691 Springer
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re

ISBN: 9783642269691 / Angielski / Miękka / 290 str.

ISBN: 9783642269691/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson;Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 201,24

 Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings Wang, Guojun 9783319035833 Springer
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

ISBN: 9783319035833 / Angielski / Miękka / 480 str.

ISBN: 9783319035833/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guojun Wang; Indrakshi Ray; Dengguo Feng
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in N...
cena: 201,24

 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory AAron Walters 9781118825099 John Wiley & Sons Inc
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

ISBN: 9781118825099 / Angielski / Miękka / 912 str.

ISBN: 9781118825099/Angielski/Miękka/912 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
AAron Walters
Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,...

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memo...

cena: 268,09

 Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers Zia, Tanveer 9783319042824 Springer
Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers

ISBN: 9783319042824 / Angielski / Miękka / 420 str.

ISBN: 9783319042824/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tanveer Zia; Albert Zomaya; Vijay Varadharajan
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communic...
cena: 201,24

 Information Theoretic Security: 7th International Conference, Icits 2013, Singapore, November 28-30, 2013, Proceedings Padró, Carles 9783319042671 Springer
Information Theoretic Security: 7th International Conference, Icits 2013, Singapore, November 28-30, 2013, Proceedings

ISBN: 9783319042671 / Angielski / Miękka / 259 str.

ISBN: 9783319042671/Angielski/Miękka/259 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carles Padro
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding...
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November...
cena: 201,24

 Bitcoin for the Befuddled Conrad Barski Chris Wilmer 9781593275730 No Starch Press
Bitcoin for the Befuddled

ISBN: 9781593275730 / Angielski / Miękka / 256 str.

ISBN: 9781593275730/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Conrad Barski; Chris Wilmer

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions without the oversight of a central authority or government. If you want to get into the Bitcoin game but find yourself a little confused, Bitcoin for the Befuddled may be just what you're looking for. Learn what Bitcoin is; how it works; and how to acquire, store, and spend bitcoins...

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin--the game-changing digital currency used by m...

cena: 127,87

 A Framework for Designing Cryptographic Key Management Systems Nist 9781494446055 Createspace
A Framework for Designing Cryptographic Key Management Systems

ISBN: 9781494446055 / Angielski / Miękka / 128 str.

ISBN: 9781494446055/Angielski/Miękka/128 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nist
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing ...
cena: 60,65

 Recommendation for Block Cipher Modes of Operation Methods and Techniques Nist 9781495211041 Createspace
Recommendation for Block Cipher Modes of Operation Methods and Techniques

ISBN: 9781495211041 / Angielski / Miękka / 70 str.

ISBN: 9781495211041/Angielski/Miękka/70 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nist
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
cena: 56,61

 Topics in Cryptology -- Ct-Rsa 2014: The Cryptographer's Track at the Rsa Conference 2014, San Francisco, Ca, Usa, February 25-28, 2014, Proceedings Benaloh, Josh 9783319048512 Springer
Topics in Cryptology -- Ct-Rsa 2014: The Cryptographer's Track at the Rsa Conference 2014, San Francisco, Ca, Usa, February 25-28, 2014, Proceedings

ISBN: 9783319048512 / Angielski / Miękka / 501 str.

ISBN: 9783319048512/Angielski/Miękka/501 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josh Benaloh
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, i...
cena: 201,24

 Pairing-Based Cryptography -- Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers Cao, Zhenfu 9783319048727 Springer
Pairing-Based Cryptography -- Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers

ISBN: 9783319048727 / Angielski / Miękka / 251 str.

ISBN: 9783319048727/Angielski/Miękka/251 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zhenfu Cao; Fangguo Zhang

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013.

The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.


This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, Ch...

cena: 201,24

 Theory of Cryptography: 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings Yehuda Lindell 9783642542411 Springer-Verlag Berlin and Heidelberg GmbH &
Theory of Cryptography: 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings

ISBN: 9783642542411 / Angielski / Miękka / 739 str.

ISBN: 9783642542411/Angielski/Miękka/739 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yehuda Lindell
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. ...
cena: 201,24

 Information Security Applications: 14th International Workshop, Wisa 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers Kim, Yongdae 9783319051482 Springer
Information Security Applications: 14th International Workshop, Wisa 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers

ISBN: 9783319051482 / Angielski / Miękka / 273 str.

ISBN: 9783319051482/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yongdae Kim; Heejo Lee; Adrian Perrig
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on ...
cena: 201,24

 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) National Institute of Standards and Tech Elaine Barker Don Johnson 9781495447501 Createspace
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)

ISBN: 9781495447501 / Angielski / Miękka / 116 str.

ISBN: 9781495447501/Angielski/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
National Institute of Standards and Tech; Elaine Barker; Don Johnson
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: ANS X9.42 (Agreement of Symmetric Keys Using Discrete Logarithm Cryptography) and ANS X9.63 (Key Agreement and Key Transport Using Elliptic Curve Cryptography).
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standard...
cena: 47,54

 Foundations and Practice of Security: 6th International Symposium, Fps 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers Danger, Jean Luc 9783319053011 Springer
Foundations and Practice of Security: 6th International Symposium, Fps 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

ISBN: 9783319053011 / Angielski / Miękka / 444 str.

ISBN: 9783319053011/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jean Luc Danger; Mourad Debbabi; Jean-Yves Marion
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Roche...
cena: 201,24

 Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014. Martinez Perez, Gregorio 9783642545245 Springer
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014.

ISBN: 9783642545245 / Angielski / Miękka / 564 str.

ISBN: 9783642545245/Angielski/Miękka/564 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregorio Martinez Perez; Sabu M. Thampi; Ryan Ko
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following...
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2...
cena: 201,24

 Public-Key Cryptography -- PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings Hugo Krawczyk 9783642546303 Springer-Verlag Berlin and Heidelberg GmbH &
Public-Key Cryptography -- PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings

ISBN: 9783642546303 / Angielski / Miękka / 686 str.

ISBN: 9783642546303/Angielski/Miękka/686 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hugo Krawczyk

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.


This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, he...

cena: 201,24

 A Cryptography Primer: Secrets and Promises Klein, Philip N. 9781107017887 Cambridge University Press
A Cryptography Primer: Secrets and Promises

ISBN: 9781107017887 / Angielski / Twarda / 186 str.

ISBN: 9781107017887/Angielski/Twarda/186 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philip N. Klein
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs,...
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application ma...
cena: 349,66

 A Cryptography Primer: Secrets and Promises Klein, Philip N. 9781107603455 Cambridge University Press
A Cryptography Primer: Secrets and Promises

ISBN: 9781107603455 / Angielski / Miękka / 186 str.

ISBN: 9781107603455/Angielski/Miękka/186 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philip N. Klein
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs,...
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application ma...
cena: 183,42

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia