• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Trust and Trustworthy Computing: 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings Holz, Thorsten 9783319085920 Springer
Trust and Trustworthy Computing: 7th International Conference, Trust 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings

ISBN: 9783319085920 / Angielski / Miękka / 226 str.

ISBN: 9783319085920/Angielski/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thorsten Holz; Sotiris Ioannidis
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, ...
cena: 193,23

 Digital-Forensics and Watermarking: 12th International Workshop, Iwdw 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers Shi, Yun Qing 9783662438855 Springer
Digital-Forensics and Watermarking: 12th International Workshop, Iwdw 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

ISBN: 9783662438855 / Angielski / Miękka / 530 str.

ISBN: 9783662438855/Angielski/Miękka/530 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi; Hyoung Joong Kim; Fernando Perez-Gonzalez
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, he...
cena: 201,24

 Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers Shiho Moriai 9783662439326 Springer-Verlag Berlin and Heidelberg GmbH &
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

ISBN: 9783662439326 / Angielski / Miękka / 605 str.

ISBN: 9783662439326/Angielski/Miękka/605 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shiho Moriai
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Sing...
cena: 201,24

 Trust, Privacy, and Security in Digital Business: 11th International Conference, Trustbus 2014, Munich, Germany, September 2-3, 2014. Proceedings Eckert, Claudia 9783319097695 Springer
Trust, Privacy, and Security in Digital Business: 11th International Conference, Trustbus 2014, Munich, Germany, September 2-3, 2014. Proceedings

ISBN: 9783319097695 / Angielski / Miękka / 191 str.

ISBN: 9783319097695/Angielski/Miękka/191 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claudia Eckert; Sokratis K. Katsikas; Gunther Pernul
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in M...
cena: 193,23

 Advances in Information and Computer Security: 9th International Workshop on Security, Iwsec 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings Yoshida, Maki 9783319098425 Springer
Advances in Information and Computer Security: 9th International Workshop on Security, Iwsec 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

ISBN: 9783319098425 / Angielski / Miękka / 287 str.

ISBN: 9783319098425/Angielski/Miękka/287 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maki Yoshida; Koichi Mouri
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The...
cena: 193,23

 Advances in Cryptology -- Crypto 2014: 34th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2014, Proceedings, Part I Garay, Juan A. 9783662443705 Springer
Advances in Cryptology -- Crypto 2014: 34th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2014, Proceedings, Part I

ISBN: 9783662443705 / Angielski / Miękka / 574 str.

ISBN: 9783662443705/Angielski/Miękka/574 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay; Rosario Gennaro

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of...

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 20...

cena: 201,24

 Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II Juan A. Garay, Rosario Gennaro 9783662443804 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

ISBN: 9783662443804 / Angielski / Miękka / 532 str.

ISBN: 9783662443804/Angielski/Miękka/532 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay;Rosario Gennaro

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.

The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of...

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 20...

cena: 201,24

 Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records Robichau, Bernard Peter 9781430266761 Apress
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

ISBN: 9781430266761 / Angielski / Miękka / 194 str.

ISBN: 9781430266761/Angielski/Miękka/194 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernard Peter Robichau
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations.

Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in...

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives ...
cena: 301,89

 Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs Martin, J. 9781137399045 Palgrave Pivot
Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs

ISBN: 9781137399045 / Angielski / Twarda / 92 str.

ISBN: 9781137399045/Angielski/Twarda/92 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Martin
This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptomarkets can be found thriving on the dark net. Martin explores how these websites defy powerful law enforcement agencies and represent the new digital front in the 'war on drugs'.
This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptoma...
cena: 261,63

 Security and Cryptography for Networks: 9th International Conference, Scn 2014, Amalfi, Italy, September 3-5, 2014. Proceedings Abdalla, Michel 9783319108780 Springer
Security and Cryptography for Networks: 9th International Conference, Scn 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

ISBN: 9783319108780 / Angielski / Miękka / 609 str.

ISBN: 9783319108780/Angielski/Miękka/609 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla; Roberto De Prisco
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key...
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September ...
cena: 201,24

 Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine Ruan, Xiaoyu 9781430265719 Apress
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

ISBN: 9781430265719 / Angielski / Miękka / 272 str.

ISBN: 9781430265719/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xiaoyu Ruan

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security...

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the sec...

cena: 152,93

 Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I Kutylowski, Miroslaw 9783319112022 Springer
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

ISBN: 9783319112022 / Angielski / Miękka / 545 str.

ISBN: 9783319112022/Angielski/Miękka/545 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miroslaw Kutylowski; Jaideep Vaidya
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal...
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESOR...
cena: 201,24

 Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I Kutylowski, Miroslaw 9783319112114 Springer
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

ISBN: 9783319112114 / Angielski / Miękka / 516 str.

ISBN: 9783319112114/Angielski/Miękka/516 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miroslaw Kutylowski; Jaideep Vaidya
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal...
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESOR...
cena: 201,24

 Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings Lejla Batina, Matthew Robshaw 9783662447086 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings

ISBN: 9783662447086 / Angielski / Miękka / 618 str.

ISBN: 9783662447086/Angielski/Miękka/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lejla Batina;Matthew Robshaw
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, Sou...
cena: 201,24

 Cryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings Kotulski, Zbigniew 9783662448922 Springer
Cryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings

ISBN: 9783662448922 / Angielski / Miękka / 209 str.

ISBN: 9783662448922/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zbigniew Kotulski; Bogdan Ksiezopolski; Katarzyna Mazur
This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining 10 deal with recent problems of cryptographic protocols.
This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, P...
cena: 201,24

 Trusted Computing Platforms: Tpm2.0 in Context Proudler, Graeme 9783319087436 Springer International Publishing AG
Trusted Computing Platforms: Tpm2.0 in Context

ISBN: 9783319087436 / Angielski / Twarda / 382 str.

ISBN: 9783319087436/Angielski/Twarda/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Graeme Proudler;Liqun Chen;Chris Dalton
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe t...
cena: 644,07

 The Infosec Handbook: An Introduction to Information Security Nayak, Umesha 9781430263821 Apress
The Infosec Handbook: An Introduction to Information Security

ISBN: 9781430263821 / Angielski / Miękka / 392 str.

ISBN: 9781430263821/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Umesha Nayak; Umesh Rao; Andy Nayak
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to...

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the...
cena: 181,11

 Automated Firewall Analytics: Design, Configuration and Optimization Al-Shaer, Ehab 9783319103709 Springer
Automated Firewall Analytics: Design, Configuration and Optimization

ISBN: 9783319103709 / Angielski / Twarda / 132 str.

ISBN: 9783319103709/Angielski/Twarda/132 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehab Al-Shaer
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author...
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewa...
cena: 402,53

 Cyber Defense and Situational Awareness Alexander Kott Cliff Wang Robert Erbacher 9783319113906 Springer
Cyber Defense and Situational Awareness

ISBN: 9783319113906 / Angielski / Twarda / 329 str.

ISBN: 9783319113906/Angielski/Twarda/329 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander Kott; Cliff Wang; Robert Erbacher
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
cena: 402,53

 Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings Bernsmed, Karin 9783319115986 Springer
Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings

ISBN: 9783319115986 / Angielski / Miękka / 296 str.

ISBN: 9783319115986/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karin Bernsmed; Simone Fischer-Hubner
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers ...
cena: 193,23

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia