• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers Nicolas Christin, Reihaneh Safavi-Naini 9783662454718 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers

ISBN: 9783662454718 / Angielski / Miękka / 506 str.

ISBN: 9783662454718/Angielski/Miękka/506 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Christin;Reihaneh Safavi-Naini
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu...
cena: 201,24

 A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security Arthur, Will 9781430265832 Apress
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

ISBN: 9781430265832 / Angielski / Miękka / 392 str.

ISBN: 9781430265832/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Will Arthur; David Challener

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.

Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of...

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security ...
cena: 181,11

 The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web Lepofsky, Ron 9781484201497 Apress
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

ISBN: 9781484201497 / Angielski / Miękka / 232 str.

ISBN: 9781484201497/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ron Lepofsky

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly...

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every...

cena: 402,53

 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy Rzeszut, Eric 9781484203682 Apress
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

ISBN: 9781484203682 / Angielski / Miękka / 180 str.

ISBN: 9781484203682/Angielski/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Rzeszut; Daniel Bachrach

In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud based storage and mobile apps.

It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work,...

In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices ex...

cena: 132,80

 Homomorphic Encryption and Applications Xun Yi Russell Paulet Elisa Bertino 9783319122281 Springer
Homomorphic Encryption and Applications

ISBN: 9783319122281 / Angielski / Miękka / 126 str.

ISBN: 9783319122281/Angielski/Miękka/126 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xun Yi; Russell Paulet; Elisa Bertino
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as...
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private i...
cena: 301,89

 Security Protocols XXII: 22nd International Workshop, Cambridge, Uk, March 19-21, 2014, Revised Selected Papers Christianson, Bruce 9783319123998 Springer
Security Protocols XXII: 22nd International Workshop, Cambridge, Uk, March 19-21, 2014, Revised Selected Papers

ISBN: 9783319123998 / Angielski / Miękka / 373 str.

ISBN: 9783319123998/Angielski/Miękka/373 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vashek Matya; Petr Venda; Bruce Christianson

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy."

"

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge...

cena: 201,24

 Information Security: 17th International Conference, Isc 2014, Hong Kong, China, October 12-14, 2014, Proceedings Chow, Sherman S. M. 9783319132563 Springer
Information Security: 17th International Conference, Isc 2014, Hong Kong, China, October 12-14, 2014, Proceedings

ISBN: 9783319132563 / Angielski / Miękka / 570 str.

ISBN: 9783319132563/Angielski/Miękka/570 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sherman S. M. Chow; Jan Camenisch; Lucas C. K. Hui

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android...

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in...

cena: 201,24

 Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Peterson, Gilbert 9783642428432 Springer
Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised

ISBN: 9783642428432 / Angielski / Miękka / 334 str.

ISBN: 9783642428432/Angielski/Miękka/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 201,24

 Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers Lin, Dongdai 9783319120867 Springer
Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers

ISBN: 9783319120867 / Angielski / Miękka / 408 str.

ISBN: 9783319120867/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongdai Lin; Shouhuai Xu; Moti Yung

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013.

The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system...

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptolog...

cena: 201,24

 Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II Palash Sarkar, Tetsu Iwata 9783662456071 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II

ISBN: 9783662456071 / Angielski / Miękka / 528 str.

ISBN: 9783662456071/Angielski/Miękka/528 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Palash Sarkar;Tetsu Iwata
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero...
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryp...
cena: 201,24

 Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings Palash Sarkar, Tetsu Iwata 9783662456101 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings

ISBN: 9783662456101 / Angielski / Miękka / 574 str.

ISBN: 9783662456101/Angielski/Miękka/574 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Palash Sarkar;Tetsu Iwata
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero...
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryp...
cena: 201,24

 Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats Donaldson, Scott 9781430260820 APress
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

ISBN: 9781430260820 / Angielski / Miękka / 536 str.

ISBN: 9781430260820/Angielski/Miękka/536 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Donaldson;Scott Siegel;C. Williams

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment.

Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker...

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the ...

cena: 385,31

 An Easy Introduction to Cryptography M. Zia 9781503013582 Createspace
An Easy Introduction to Cryptography

ISBN: 9781503013582 / Angielski / Miękka / 56 str.

ISBN: 9781503013582/Angielski/Miękka/56 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Zia
Beginning with the origins of the subject, we then understand some common definitions. Then start with basic methods of encryption- briefly discuss their flaws, cover some more "interesting" examples which will readily lead us onto one of the most influential discoveries of the 20th century; public key cryptography, most notably RSA.
Beginning with the origins of the subject, we then understand some common definitions. Then start with basic methods of encryption- briefly discuss th...
cena: 40,43

 Applications and Techniques in Information Security: International Conference, Atis 2014, Melbourne, Australia, November 26-28, 2014. Proceedings Batten, Lynn 9783662456699 Springer
Applications and Techniques in Information Security: International Conference, Atis 2014, Melbourne, Australia, November 26-28, 2014. Proceedings

ISBN: 9783662456699 / Angielski / Miękka / 266 str.

ISBN: 9783662456699/Angielski/Miękka/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lynn Batten; Gang Li; Wenjia Niu
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held...
cena: 201,24

 Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings Nishigaki, Masakatsu 9783642422348 Springer
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings

ISBN: 9783642422348 / Angielski / Miękka / 276 str.

ISBN: 9783642422348/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masakatsu Nishigaki;Audun Josang;Yuko Murayama
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue...
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan...
cena: 201,24

 Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes) Shoniregun, Charles A. 9781461498919 Springer
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)

ISBN: 9781461498919 / Angielski / Miękka / 196 str.

ISBN: 9781461498919/Angielski/Miękka/196 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles a Shoniregun
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Within the UK economy, the notion of TEISMEs is one that forms the focus for this research. Other technologies that enabled information are also discussed. For example electronic mail (e-mail), voice mail, facsimile machines (fax), teleconferencing, data...
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discover...
cena: 402,53

 Security Standardisation Research: First International Conference, Ssr 2014, London, Uk, December 16-17, 2014. Proceedings Chen, Liqun 9783319140537 Springer
Security Standardisation Research: First International Conference, Ssr 2014, London, Uk, December 16-17, 2014. Proceedings

ISBN: 9783319140537 / Angielski / Miękka / 257 str.

ISBN: 9783319140537/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liqun Chen;Chris Mitchell
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, ...
cena: 193,23

 Understanding Cryptography: A Textbook for Students and Practitioners Jan Pelzl 9783642446498 Springer
Understanding Cryptography: A Textbook for Students and Practitioners

ISBN: 9783642446498 / Angielski / Miękka / 372 str.

ISBN: 9783642446498/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Pelzl

Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard...

Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptograp...

cena: 152,93

 Introduction to Certificateless Cryptography Hu Xiong 9781482248609 CRC Press
Introduction to Certificateless Cryptography

ISBN: 9781482248609 / Angielski / Twarda / 314 str.

ISBN: 9781482248609/Angielski/Twarda/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hu Xiong

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.
Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.


As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as w...

cena: 416,26

 Cyber Warfare: Building the Scientific Foundation Jajodia, Sushil 9783319140384 Springer
Cyber Warfare: Building the Scientific Foundation

ISBN: 9783319140384 / Angielski / Twarda / 321 str.

ISBN: 9783319140384/Angielski/Twarda/321 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Paulo Shakarian; V. S. Subrahmanian
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially...
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is ...
cena: 523,30

Pierwsza Podprzednia  28  29  30  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia