• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2770

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Cryptology - Crypto '97: 17th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 17-21, 1997, Proceedings Kaliski, Burton S. Jr. 9783540633846 Springer
Advances in Cryptology - Crypto '97: 17th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 17-21, 1997, Proceedings

ISBN: 9783540633846 / Angielski / Miękka / 546 str.

ISBN: 9783540633846/Angielski/Miękka/546 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. S. Kaliski; Burton S. Jr. Kaliski
This book constitutes the refereed proceedings of the 17th Annual International Cryptology Conference, CRYPTO'97, held in Santa Barbara, California, USA, in August 1997 under the sponsorship of the International Association for Cryptologic Research (IACR).
The volume presents 35 revised full papers selected from 160 submissions received. Also included are two invited presentations. The papers are organized in sections on complexity theory, cryptographic primitives, lattice-based cryptography, digital signatures, cryptanalysis of public-key cryptosystems, information theory, elliptic curve...
This book constitutes the refereed proceedings of the 17th Annual International Cryptology Conference, CRYPTO'97, held in Santa Barbara, California, U...
cena: 402,53

 Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 13th International Symposium, Aaecc-13 Honolulu, Hawaii, Usa, November 15-19, 1999 P Fossorier, Marc 9783540667230 Springer
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 13th International Symposium, Aaecc-13 Honolulu, Hawaii, Usa, November 15-19, 1999 P

ISBN: 9783540667230 / Angielski / Miękka / 518 str.

ISBN: 9783540667230/Angielski/Miękka/518 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Fossorier; S. Lin; H. Imai
This book constitutes the refereed proceedings of the 19th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-13, held in Honolulu, Hawaii, USA in November 1999.
The 42 revised full papers presented together with six invited survey papers were carefully reviewed and selected from a total of 86 submissions. The papers are organized in sections on codes and iterative decoding, arithmetic, graphs and matrices, block codes, rings and fields, decoding methods, code construction, algebraic curves, cryptography, codes and decoding, convolutional...
This book constitutes the refereed proceedings of the 19th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes...
cena: 201,24

 The Stability Theory of Stream Ciphers C. Ding Cunsheng Ding Guozhen Xiao 9783540549734 Springer
The Stability Theory of Stream Ciphers

ISBN: 9783540549734 / Angielski / Miękka / 194 str.

ISBN: 9783540549734/Angielski/Miękka/194 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
C. Ding; Cunsheng Ding; Guozhen Xiao
Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practical means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment...
Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practical means to this end. This mo...
cena: 201,24

 Cryptology and Network Security: 6th International Conference, CANS 2007 Singapore, December 8-10, 2007 Proceedings Bao, Feng 9783540769682 Not Avail
Cryptology and Network Security: 6th International Conference, CANS 2007 Singapore, December 8-10, 2007 Proceedings

ISBN: 9783540769682 / Angielski / Miękka / 302 str.

ISBN: 9783540769682/Angielski/Miękka/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.


This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore...

cena: 201,24

 Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Boztas, Serdar 9783540772231 Not Avail
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes

ISBN: 9783540772231 / Angielski / Miękka / 388 str.

ISBN: 9783540772231/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serdar Boztas

This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra.


This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Co...

cena: 201,24

 Computer Safety, Reliability and Security: 17th International Conference, Safecomp'98, Heidelberg Germany, October 5-7, 1998, Proceedings Ehrenberger, Wolfgang 9783540651109 Springer
Computer Safety, Reliability and Security: 17th International Conference, Safecomp'98, Heidelberg Germany, October 5-7, 1998, Proceedings

ISBN: 9783540651109 / Angielski / Miękka / 404 str.

ISBN: 9783540651109/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. D. Ehrenberger; Wolfgang Ehrenberger
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all...
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into ...
cena: 201,24

 Advances in Cryptology - Eurocrypt '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - J Nyberg, Kaisa 9783540645184 Springer
Advances in Cryptology - Eurocrypt '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - J

ISBN: 9783540645184 / Angielski / Miękka / 613 str.

ISBN: 9783540645184/Angielski/Miękka/613 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Goos; J. Hartmanis; K. Nyberg
This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998.
The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve...
This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRY...
cena: 201,24

 Privacy-Preserving Data Mining: Models and Algorithms Aggarwal, Charu C. 9780387709918 Not Avail
Privacy-Preserving Data Mining: Models and Algorithms

ISBN: 9780387709918 / Angielski / Twarda / 514 str.

ISBN: 9780387709918/Angielski/Twarda/514 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charu C. Aggarwal; Philip S. Yu

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and...

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns t...

cena: 885,61

 Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 15th International Symposium, Aaecc-15, Toulouse, France, May 12-16, 2003, Proceedin Fossorier, Marc 9783540401117 Springer
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 15th International Symposium, Aaecc-15, Toulouse, France, May 12-16, 2003, Proceedin

ISBN: 9783540401117 / Angielski / Miękka / 270 str.

ISBN: 9783540401117/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Ed Fossorier; Tom Hoeholdt; Alain Poli
TheAAECCsymposiumwasstartedinJune1983byAlainPoli(Toulouse), who, together with Roger Desq, Daniel Lazard, and Paul Camion, organized the ?rst conference. The meaning of the acronym AAECC changed from Applied - gebra and Error Correcting Codes to Applied Algebra, Algebraic Algorithms, and Error Correcting Codes. One reason for this was the increasing importance of complexity, particularly for decoding algorithms. During the AAECC-12 s- posium the conference committee decided to enforce the theory and practice of the coding side as well as the cryptographic aspects. Algebra was conserved, as in...
TheAAECCsymposiumwasstartedinJune1983byAlainPoli(Toulouse), who, together with Roger Desq, Daniel Lazard, and Paul Camion, organized the ?rst conferen...
cena: 201,24

 Advances in Cryptology: Proceedings of Crypto '84 Blakely, G. R. 9783540156581 Springer
Advances in Cryptology: Proceedings of Crypto '84

ISBN: 9783540156581 / Angielski / Miękka / 496 str.

ISBN: 9783540156581/Angielski/Miękka/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. R. Blakely; D. Chaum
Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2...
Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generator...
cena: 201,24

 Advances in Cryptology - Eurocrypt '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1 Chaum, David 9783540191025 Springer
Advances in Cryptology - Eurocrypt '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1

ISBN: 9783540191025 / Angielski / Miękka / 316 str.

ISBN: 9783540191025/Angielski/Miękka/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chaum; Wyn L. Price
It is our pleasure to thank dl those uho contributed to nialing thew proceeding possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th, it Tore Ilerle tam. J member 01 the programme committee, had died unexpsctedl Thi olunie I dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur, 1988 __ . .. . I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirrlio. k.d.. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography:...
It is our pleasure to thank dl those uho contributed to nialing thew proceeding possible: the authors. progriimme committee. organihing committee, I4C...
cena: 201,24

 Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers Christianson, Bruce 9783540208303 Springer
Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers

ISBN: 9783540208303 / Angielski / Miękka / 248 str.

ISBN: 9783540208303/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruno Crispo; James A. Malcolm; Michael Roe
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol Participants." Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the...
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth e...
cena: 201,24

 Secure Data Management: Vldb 2004 Workshop, Sdm 2004, Toronto, Canada, August 30, 2004, Proceedings Jonker, Willem 9783540229834 Springer
Secure Data Management: Vldb 2004 Workshop, Sdm 2004, Toronto, Canada, August 30, 2004, Proceedings

ISBN: 9783540229834 / Angielski / Miękka / 224 str.

ISBN: 9783540229834/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker; Milan Petkovic; Canada) Sdm 2004 (2004 Toronto
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on dat...
cena: 201,24

 Security in Ad-Hoc and Sensor Networks: First European Workshop, Esas 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers Castelluccia, Claude 9783540243960 Springer
Security in Ad-Hoc and Sensor Networks: First European Workshop, Esas 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers

ISBN: 9783540243960 / Angielski / Miękka / 231 str.

ISBN: 9783540243960/Angielski/Miękka/231 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claude Castelluccia; Hannes Hartenstein; Christof Paar

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability, and privacy issues are not addressed adequately.

As the first book devoted to the topic, this volume constitutes the thoroughly refereed...

Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, enviro...

cena: 201,24

 Security and Privacy in Ad-Hoc and Sensor Networks: Second European Workshop, Esas 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers Molva, Refik 9783540309123 Springer
Security and Privacy in Ad-Hoc and Sensor Networks: Second European Workshop, Esas 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers

ISBN: 9783540309123 / Angielski / Miękka / 219 str.

ISBN: 9783540309123/Angielski/Miękka/219 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Molva; Refik Molva; Gene Tsudik
It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13 14 in Visegrad (Hungary) in conjunction with the First International Conference on Wireless Internet (WICON) . As Program Co-chairs, we are very happy with the outcome of this year s ESAS workshop. It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop stopic: securityandprivacy inadhocandsensor networks.Atotalof51fullpapersweresubmitted.Eachsubmissionwasreviewed by at least three expert referees. After a short period...
It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13 14 in ...
cena: 201,24

 Selected Areas in Cryptography: 8th Annual International Workshop, Sac 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers Vaudenay, Serge 9783540430667 Springer
Selected Areas in Cryptography: 8th Annual International Workshop, Sac 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers

ISBN: 9783540430667 / Angielski / Miękka / 364 str.

ISBN: 9783540430667/Angielski/Miękka/364 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Vaudenay; A. M. Youssef; Serge Vaudenay
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001. The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in To...
cena: 201,24

 Local Area Network Security: Workshop Lansec '89. European Institute for System Security (E.I.S.S.) Karlsruhe, Frg, April 3-6, 1989. Proceedings Berson, Thomas A. 9783540517542 Springer
Local Area Network Security: Workshop Lansec '89. European Institute for System Security (E.I.S.S.) Karlsruhe, Frg, April 3-6, 1989. Proceedings

ISBN: 9783540517542 / Angielski / Miękka / 156 str.

ISBN: 9783540517542/Angielski/Miękka/156 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas A. Berson; Thomas Beth
cena: 92,55

 Advances in Computer Science - Asian 2004, Higher Level Decision Making: 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Maher, Michael J. 9783540240877 Springer
Advances in Computer Science - Asian 2004, Higher Level Decision Making: 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the

ISBN: 9783540240877 / Angielski / Miękka / 510 str.

ISBN: 9783540240877/Angielski/Miękka/510 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael J. Maher

This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated to Jean-Louis Lassez on the occasion of his 60th birthday and held in Chiang Mai, Thailand in December 2004.

The 17 revised full papers presented together with 3 keynote papers and 16 invited papers honouring Jean-Louis Lassez were carefully reviewed and selected from 75 submissions. The contributed papers are focusing on higher-level decision making, whereas the invited papers address a broader variety of topics in theoretical computer science.


This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated to Jean-Louis Lassez on the occ...

cena: 402,53

 Digital Watermarking: Third International Workshop, Iwdw 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers Cox, Ingemar J. 9783540248392 Springer
Digital Watermarking: Third International Workshop, Iwdw 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers

ISBN: 9783540248392 / Angielski / Miękka / 306 str.

ISBN: 9783540248392/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ingemar J. Cox; Ton Kalker; Heung-Kyu Lee
Constitutes the refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/November 2004. These papers are organized in topical sections on systems, theory, authentication and steganography, cryptography, and methods.
Constitutes the refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/Nove...
cena: 201,24

 Emerging Trends in Information and Communication Security: International Conference, Etrics 2006, Freiburg, Germany, June 6-9, 2006. Proceedings Müller, Günter 9783540346401 Springer
Emerging Trends in Information and Communication Security: International Conference, Etrics 2006, Freiburg, Germany, June 6-9, 2006. Proceedings

ISBN: 9783540346401 / Angielski / Miękka / 532 str.

ISBN: 9783540346401/Angielski/Miękka/532 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G]nter M]ller; Gunter Muller

This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.


This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS...

cena: 201,24

Pierwsza Podprzednia  88  89  90  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia