• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Cryptology - Auscrypt '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December Seberry, Jennifer 9783540572206 Springer
Advances in Cryptology - Auscrypt '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December

ISBN: 9783540572206 / Angielski / Miękka / 444 str.

ISBN: 9783540572206/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jennifer Seberry; Yuliang Zheng
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, including authentication, cryptanalysis, cryptographic protocols, digital signatures, the design of block ciphers, pseudo-random sequences and more.
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, incl...
cena: 201,72 zł

 Advances in Cryptology - Asiacrypt'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, Novem Lam, Kwok Yan 9783540666660 Springer
Advances in Cryptology - Asiacrypt'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, Novem

ISBN: 9783540666660 / Angielski / Miękka / 420 str.

ISBN: 9783540666660/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
K. y. Lam; C. Xing; E. Okamoto
Asiacrypt 99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt 99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt 99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This...
Asiacrypt 99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt 99, th...
cena: 201,72 zł

 Digital Rights Management: Technological, Economic, Legal and Political Aspects Becker, Eberhard 9783540404651 Springer
Digital Rights Management: Technological, Economic, Legal and Political Aspects

ISBN: 9783540404651 / Angielski / Miękka / 812 str.

ISBN: 9783540404651/Angielski/Miękka/812 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eberhard Becker; Willms Buhse; Dirk G]nnewig
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics and lawyers, economists and business practitioners. The two conferences on the issue held in 2000 and 2002 in Berlin, Germany, brought these people together for fruitful discussions. This book continues this process by providing insights into the three main areas that DRM in?uences and that DRM is in?uenced by: technology, economics, and law and politics. Looking at the ?rst results of the two conferences we would like to emphasize three...
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics ...
cena: 403,47 zł

 Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings Christianson, Bruce 9783540656630 Springer
Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings

ISBN: 9783540656630 / Angielski / Miękka / 252 str.

ISBN: 9783540656630/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson; B. Christianson; B. Crispo
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK ...
cena: 201,72 zł

 Computer Security - Esorics 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings Bertino, Elisa 9783540617709 Springer
Computer Security - Esorics 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings

ISBN: 9783540617709 / Angielski / Miękka / 377 str.

ISBN: 9783540617709/Angielski/Miękka/377 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elisa Bertino; Helmut Kurth; Giancarlo Martella
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in Se...
cena: 201,72 zł

 Advances in Cryptology - Asiacrypt '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Kore Kim, Kwangjo 9783540618720 Springer
Advances in Cryptology - Asiacrypt '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Kore

ISBN: 9783540618720 / Angielski / Miękka / 404 str.

ISBN: 9783540618720/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kim; Kwangjo Kim; Tsutomu Matsumoto
This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996.
The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean...
This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information S...
cena: 201,72 zł

 Information Security and Privacy: First Australasian Conference, Acisp '96, Wollongong, Nsw, Australia, June 24 - 26, 1996, Proceedings Pieprzyk, Josef 9783540619918 Springer
Information Security and Privacy: First Australasian Conference, Acisp '96, Wollongong, Nsw, Australia, June 24 - 26, 1996, Proceedings

ISBN: 9783540619918 / Angielski / Miękka / 341 str.

ISBN: 9783540619918/Angielski/Miękka/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Piepryzk; Josef Pieprzyk; Jennifer Seberry
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection,...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, A...
cena: 201,72 zł

 Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings Anderson, Ross 9783540619963 Springer
Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings

ISBN: 9783540619963 / Angielski / Miękka / 364 str.

ISBN: 9783540619963/Angielski/Miękka/364 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anderson; Ross Anderson
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge.
Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is...
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK...
cena: 201,72 zł

 Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings Lomas, Mark 9783540624943 Springer
Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings

ISBN: 9783540624943 / Angielski / Miękka / 203 str.

ISBN: 9783540624943/Angielski/Miękka/203 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Lomas
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute.
The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong...
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the contex...
cena: 201,72 zł

 Selected Areas in Cryptography: 5th Annual International Workshop, Sac'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings Tavares, Stafford 9783540658948 Springer
Selected Areas in Cryptography: 5th Annual International Workshop, Sac'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings

ISBN: 9783540658948 / Angielski / Miękka / 386 str.

ISBN: 9783540658948/Angielski/Miękka/386 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Tavares; H. Meiuer; Stafford Tavares
AC 98 A C - . AC 94 AC 96 K AC 95 AC 97 C O . & . I - * . & * AC 98: D A ** K C * E? I* * C * C I /M N O 39 * AC 98,26 - * .& , A M K A * E B * I O J: C J -3"
AC 98 A C - . AC 94 AC 96 K AC 95 AC 97 C O . & . I - * . & * AC 98: D A ** K C * E? I* * C * C I /M N O 39 * AC 98,26 - * .& , A M K A * E B * I...
cena: 201,72 zł

 Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers Furon, Teddy 9783540773696 Not Avail
Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers

ISBN: 9783540773696 / Angielski / Miękka / 396 str.

ISBN: 9783540773696/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Teddy Furon
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the C- sairs town, France, during June 11 13, 2007. It was organized by a team of four Frenchpiratessupported by the valuablehelp of the conferenceorganizationcell of INRIA Rennes. Continuing the tradition of the previous editions, we tried to provide a b- anced program covering the di?erent aspects of information hiding. This being said, the selection of the program was a very challenging task. This year, 105 papers from 25 countries were...
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the...
cena: 201,72 zł

 Fast Software Encryption: 8th International Workshop, Fse 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers Matsui, Mitsuru 9783540438694 Springer
Fast Software Encryption: 8th International Workshop, Fse 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers

ISBN: 9783540438694 / Angielski / Miękka / 354 str.

ISBN: 9783540438694/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mitsuru Matsui; Mitsuru Matsui
This volume constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yokohama, Japan in April 2001. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on cryptanalysis of block ciphers, hash functions and Boolean functions, modes of operation, cryptanalysis of stream ciphers, pseudo-randomness, and design and evaluation.
This volume constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yoko...
cena: 201,72 zł

 Financial Cryptography: Second International Conference, Fc'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings Hirschfeld, Rafael 9783540649519 Springer
Financial Cryptography: Second International Conference, Fc'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings

ISBN: 9783540649519 / Angielski / Miękka / 328 str.

ISBN: 9783540649519/Angielski/Miękka/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafael Hirschfeld; Rafael Hirschfeld
This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998.
The 28 revised papers presented were carefully selected and improved beyond the versions presented at the meeting. The book presents the state of the art in research and development in financial cryptography and addresses all current topics such as electronic payment systems, digital cash, electronic commerce, digital signatures, payment transactions, revocation and validation, WWW...
This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, hel...
cena: 201,72 zł

 Information and Communications Security: First International Conference, Icis'97, Beijing, China, November 11-14, 1997, Proceedings Han, Yongfei 9783540636960 Springer
Information and Communications Security: First International Conference, Icis'97, Beijing, China, November 11-14, 1997, Proceedings

ISBN: 9783540636960 / Angielski / Miękka / 486 str.

ISBN: 9783540636960/Angielski/Miękka/486 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yongfei Han; Tatsuaki Okamoto; Sihan Quing
This work constitutes the refereed proceedings of the First International Conference on Information and Communications Security, ICICS '97, held in Beijing, China, in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided into sections on theoretical foundations of security, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key...
This work constitutes the refereed proceedings of the First International Conference on Information and Communications Security, ICICS '97, held in Be...
cena: 201,72 zł

 Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting Tuyls, Pim 9781846289835 Springer
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

ISBN: 9781846289835 / Angielski / Twarda / 340 str.

ISBN: 9781846289835/Angielski/Twarda/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pim Tuyls; Boris Ekoric; Tom Kevenaar

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained ove...

cena: 403,47 zł

 Advances in Cryptology: Proceedings of Eurocrypt 84. a Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, Apr Beth, Thomas 9783540160762 Springer
Advances in Cryptology: Proceedings of Eurocrypt 84. a Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, Apr

ISBN: 9783540160762 / Angielski / Miękka / 494 str.

ISBN: 9783540160762/Angielski/Miękka/494 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Beth; Norbert Cot; Ingemar Ingemarsson
This book contains the proceedings of EUROCRYPT 85, held in Paris in 1984, April 9-11, at the University of Paris, Sorbonne. EIJROCRYPT is now an annual international European meeting in cryptology, intended primarily for the international of researchers in this area. EUROCRYPT 84 was community following previous meetings held at Burg Feuerstein in 1982 and at IJdine in 1983. In fact EUROCRYPT 84 was thc first such meeting being organized under IXCR (International Association of Cryptology Research). Other sponsors were the well-known French association on cybernetics research AFCET, the LITP...
This book contains the proceedings of EUROCRYPT 85, held in Paris in 1984, April 9-11, at the University of Paris, Sorbonne. EIJROCRYPT is now an annu...
cena: 189,61 zł

 Information Security: Third International Workshop, Isw 2000, Wollongong, Australia, December 20-21, 2000. Proceedings Pieprzyk, Josef 9783540414162 Springer
Information Security: Third International Workshop, Isw 2000, Wollongong, Australia, December 20-21, 2000. Proceedings

ISBN: 9783540414162 / Angielski / Miękka / 322 str.

ISBN: 9783540414162/Angielski/Miękka/322 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pieprzyk; Eiji Okamoto; Jennifer Seberry
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in December 2000. from 63 submissions. protection, e-commerce, key management, network security and access control, and cryptographic systems.
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in...
cena: 201,72 zł

 Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings Kwangjo Kim 9783540416586 Springer-Verlag Berlin and Heidelberg GmbH &
Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings

ISBN: 9783540416586 / Angielski / Miękka / 428 str.

ISBN: 9783540416586/Angielski/Miękka/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kwangjo Kim
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.
The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in ...
cena: 201,72 zł

 Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings Hannes Federrath 9783540417248 Springer-Verlag Berlin and Heidelberg GmbH &
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings

ISBN: 9783540417248 / Angielski / Miękka / 234 str.

ISBN: 9783540417248/Angielski/Miękka/234 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hannes Federrath
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.
This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides...
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services ...
cena: 201,72 zł

 Selected Areas in Cryptography: 7th Annual International Workshop, Sac 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings Stinson, Douglas R. 9783540420699 Springer
Selected Areas in Cryptography: 7th Annual International Workshop, Sac 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings

ISBN: 9783540420699 / Angielski / Miękka / 347 str.

ISBN: 9783540420699/Angielski/Miękka/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D. R. Stinson; Douglas R. Stinson; Stafford Tavares
This text constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000. The 24 revised ful l papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key...
This text constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, h...
cena: 201,72 zł

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia