• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2770

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings Zhou, Jianying 9783540347033 Springer
Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings

ISBN: 9783540347033 / Angielski / Miękka / 490 str.

ISBN: 9783540347033/Angielski/Miękka/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jianying Zhou; Moti Yung; Feng Bao
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York,...
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought tog...
cena: 402,53

 Information Security and Privacy: 11th Australasian Conference, Acisp 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Batten, Lynn 9783540354581 Springer
Information Security and Privacy: 11th Australasian Conference, Acisp 2006, Melbourne, Australia, July 3-5, 2006, Proceedings

ISBN: 9783540354581 / Angielski / Miękka / 446 str.

ISBN: 9783540354581/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lynn Batten; Reihaneh Safavi-Naini
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3 5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers, practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage...
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3 5 July, 2006. The conference was sponsored ...
cena: 201,24

 Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Lim, Moti Yung 9783540240150 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

ISBN: 9783540240150 / Angielski / Miękka / 474 str.

ISBN: 9783540240150/Angielski/Miękka/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chae Hoon Lim;Moti Yung

This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004.

The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.

This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Isla...

cena: 201,24

 Information Security Applications: 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers Chae, Kijoon 9783540208273 Springer
Information Security Applications: 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

ISBN: 9783540208273 / Angielski / Miękka / 512 str.

ISBN: 9783540208273/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Moti Yung; Kijoon Chae
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI), andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25-27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security,...
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute...
cena: 402,53

 Computer Security: A Bibliography with Indexes John S Potts 9781590335215 Nova Science Publishers Inc
Computer Security: A Bibliography with Indexes

ISBN: 9781590335215 / Angielski / Twarda / 132 str.

ISBN: 9781590335215/Angielski/Twarda/132 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John S Potts
cena: 342,09

 Algorithmic Number Theory: 8th International Symposium, Ants-VIII Banff, Canada, May 17-22, 2008 Proceedings Van Der Poorten, Alf J. 9783540794554 Springer
Algorithmic Number Theory: 8th International Symposium, Ants-VIII Banff, Canada, May 17-22, 2008 Proceedings

ISBN: 9783540794554 / Angielski / Miękka / 458 str.

ISBN: 9783540794554/Angielski/Miękka/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alf J. Van Der Poorten
The ?rst Algorithmic Number Theory Symposium took place in May 1994 at Cornell University. The preface to its proceedings has the organizers expressing the hope that the meeting would be "the ?rst in a long series of international conferencesonthe algorithmic, computational, andcomplexity theoreticaspects of number theory." ANTS VIII was held May 17-22, 2008 at the Ban? Centre in Ban?, Alberta, Canada. It was the eighth in this lengthening series. The conference included four invited talks, by Johannes Buchmann (TU Darmstadt), AndrewGranville(UniversitedeMontr eal), Fran, coisMorain(Ecole...
The ?rst Algorithmic Number Theory Symposium took place in May 1994 at Cornell University. The preface to its proceedings has the organizers expressin...
cena: 201,24

 Quantum Computing for Computer Scientists Noson S. Yanofsky Mirco A. Mannucci 9780521879965 Cambridge University Press
Quantum Computing for Computer Scientists

ISBN: 9780521879965 / Angielski / Twarda / 402 str.

ISBN: 9780521879965/Angielski/Twarda/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Noson S. Yanofsky; Mirco A. Mannucci
The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating area of cutting-edge research. Written in an accessible yet rigorous fashion, this book employs ideas and techniques familiar to every student of computer science. The reader is not expected to have any advanced mathematics or physics background. After presenting the necessary prerequisites, the material is organized to look at different aspects of quantum...
The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horiz...
cena: 330,39

 Autonomic and Trusted Computing: 5th International Conference, Atc 2008, Oslo, Norway, June 23-25, 2008, Proceedings Rong, Chunming 9783540692942 Springer
Autonomic and Trusted Computing: 5th International Conference, Atc 2008, Oslo, Norway, June 23-25, 2008, Proceedings

ISBN: 9783540692942 / Angielski / Miękka / 688 str.

ISBN: 9783540692942/Angielski/Miękka/688 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chunming Rong
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted C- puting (ATC 2006, China), and the 4th International Conference on...
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computi...
cena: 402,53

 Public Key Infrastructure: 5th European Pki Workshop: Theory and Practice, Europki 2008 Trondheim, Norway, June 16-17, 2008, Proceedings Mjølsnes, Stig F. 9783540694847 Springer
Public Key Infrastructure: 5th European Pki Workshop: Theory and Practice, Europki 2008 Trondheim, Norway, June 16-17, 2008, Proceedings

ISBN: 9783540694847 / Angielski / Miękka / 256 str.

ISBN: 9783540694847/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stig F. Mja Lsnes
This book contains the proceedings of the 5th European Public Key Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gloshaugen in Trondheim, Norway, in June 2008. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Simplyput, publickeysareeasiertodistributethansecretkeys.Nevertheless, constructing e?ective, practical, secure and low cost means for assuring...
This book contains the proceedings of the 5th European Public Key Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which was held on the NT...
cena: 201,24

 Arithmetic of Finite Fields: Second International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings Joachim von zur Gathen, José Luis Imana, Cetin Kaya Koc 9783540694984 Springer-Verlag Berlin and Heidelberg GmbH &
Arithmetic of Finite Fields: Second International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings

ISBN: 9783540694984 / Angielski / Miękka / 205 str.

ISBN: 9783540694984/Angielski/Miękka/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joachim von zur Gathen;José Luis Imana;Cetin Kaya Koc
These are the proceedings of WAIFI 2008, the second workshop on the Ari- metic of Finite Fields, that was held in Siena, Italy, July 6-9, 2008. The ?rst workshop, WAIFI 2007, which was held in Madrid (Spain), was received quite enthusiasticallybymathematicians, computerscientists, engineersandphysicists who are performing research on ?nite ?eld arithmetic. We believe that there is a need for a workshop series bridging the gap between the mathematical theory of ?nite ?elds and their hardware/software implementations and technical - plications. We hope that the WAIFI workshopseries, which from...
These are the proceedings of WAIFI 2008, the second workshop on the Ari- metic of Finite Fields, that was held in Siena, Italy, July 6-9, 2008. The ?r...
cena: 201,24

 Security in Communication Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers Carlo Blundo, Stelvio Cimato 9783540243014 Springer-Verlag Berlin and Heidelberg GmbH &
Security in Communication Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers

ISBN: 9783540243014 / Angielski / Miękka / 388 str.

ISBN: 9783540243014/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carlo Blundo;Stelvio Cimato
The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on September 8-10, 2004. Previous conferences also took place in Amal? in 1996, 1999 and 2002. The conference aimed at bringing together researchers in the ?elds of cr- tography and security in communication networks to foster cooperation and the exchange of ideas. The main topics included all technical aspects of data security, including: anonymity, authentication,...
The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni ...
cena: 201,24

 Contemporary Cryptology Dari Catalano Ivan Damgard 9783764372941 BIRKHAUSER VERLAG AG
Contemporary Cryptology

ISBN: 9783764372941 / Angielski / Miękka / 238 str.

ISBN: 9783764372941/Angielski/Miękka/238 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dari Catalano; Ivan Damgard

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes:
- efficient distributed computation modulo a shared secret
- multiparty computation
- foundations of modern cryptography
- provable security for public key schemes
- efficient and secure public-key cryptosystems.


The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes...

cena: 160,83

 Secure Data Management: 5th Vldb Workshop, Sdm 2008, Auckland, New Zealand, August 24, 2008, Proceedings Jonker, Willem 9783540852582 Springer
Secure Data Management: 5th Vldb Workshop, Sdm 2008, Auckland, New Zealand, August 24, 2008, Proceedings

ISBN: 9783540852582 / Angielski / Miękka / 229 str.

ISBN: 9783540852582/Angielski/Miękka/229 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker
Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present...
Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital st...
cena: 201,24

 Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference, Ip Schulzrinne, Henning 9783540890539 Springer
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference, Ip

ISBN: 9783540890539 / Angielski / Miękka / 343 str.

ISBN: 9783540890539/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henning Schulzrinne
These are the proceedings of IPTComm 2008 the Second Conference on Pr- ciples, Systems andApplications ofIP Telecommunications heldinHeidelberg, Germany, July 1 2, 2008. The scope of the conference included recent advances in the domains of convergent networks, VoIP security and multimedia service environments for next generation networks. The conference attracted 56 s- missions, of which the Program Committee selected 16 papers for publication. The review process followed strict standards: each paper received at least three reviews. We would like to thank all Program Committee members and...
These are the proceedings of IPTComm 2008 the Second Conference on Pr- ciples, Systems andApplications ofIP Telecommunications heldinHeidelberg, Germa...
cena: 201,24

 Progress in Cryptology - Indocrypt 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings Canteaut, Anne 9783540241300 Springer
Progress in Cryptology - Indocrypt 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings

ISBN: 9783540241300 / Angielski / Miękka / 431 str.

ISBN: 9783540241300/Angielski/Miękka/431 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anne Canteaut; Kapaleeswaran Viswanathan
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which 147 papers conformed to the speci?cations in the call for papers and, therefore, were accepted to the review process. Those 147 submissions were spread over 22 countries. Only 30 papers were accepted to this proceedings. We should note that many of the papers that were not accepted were of good quality but only the top 30 papers were accepted. Each submission received...
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every...
cena: 201,24

 Progress in Cryptology - Indocrypt 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings Rijmen, Vincent 9783540897538 Springer
Progress in Cryptology - Indocrypt 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

ISBN: 9783540897538 / Angielski / Miękka / 437 str.

ISBN: 9783540897538/Angielski/Miękka/437 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dipanwita Roy Chowdhury

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.

The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India...

cena: 201,24

 Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008, Proceedings Sekar, R. 9783540898610 Springer
Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India, December 16-20, 2008, Proceedings

ISBN: 9783540898610 / Angielski / Miękka / 307 str.

ISBN: 9783540898610/Angielski/Miękka/307 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Sekar
The 4th International Conference on Information System Security (ICISS 2007) was held December 16-20, 2008 at the Jawaharlal Nehru Technological Univ- sity (JNTU) in Hyderabad, India. Although this conference is held in India, it is a decidedly international conference, attracting papers from all around the world. This year, there were 81 submissions from 18 di?erent countries. The- nal program contained papers from Australia, Austria, France, Germany, India, Poland, UK, and USA. From the 81 submissions, the Program Committee accepted 15 full papers, 4 short papers, and 2 ongoing research...
The 4th International Conference on Information System Security (ICISS 2007) was held December 16-20, 2008 at the Jawaharlal Nehru Technological Univ-...
cena: 201,24

 Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth Calmet, Jacques 9783540899938 Springer
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth

ISBN: 9783540899938 / Angielski / Miękka / 189 str.

ISBN: 9783540899938/Angielski/Miękka/189 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jacques Calmet
This volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth.
This volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 200...
cena: 201,24

 Digital Watermarking: 6th International Workshop, Iwdw 2007 Guangzhou, China, December 3-5, 2007, Proceedings Shi, Yun Q. 9783540922377 Springer
Digital Watermarking: 6th International Workshop, Iwdw 2007 Guangzhou, China, December 3-5, 2007, Proceedings

ISBN: 9783540922377 / Angielski / Miękka / 498 str.

ISBN: 9783540922377/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held in Guangzhou, China, during December 3-5, 2007. The workshop was hosted by the Sun Yat-sen University and sponsored by both the National Science Foundation of China and the Korea Institute of Information Security and Cryptology. Since its birth in the early 1990s, digital watermarking has become a mature e- bling technology for solving security problems associated with multimedia distribution schemes. Digital watermarks are now used in...
th It is our great pleasure to present in this volume the proceedings of the 6 Inter- tional Workshop on Digital Watermarking (IWDW), which was held i...
cena: 201,24

 Managing Information Risk and the Economics of Security M. Eric Johnson 9780387097619 Springer
Managing Information Risk and the Economics of Security

ISBN: 9780387097619 / Niemiecki / Twarda / 347 str.

ISBN: 9780387097619/Niemiecki/Twarda/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Eric Johnson
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
cena: 603,81

Pierwsza Podprzednia  88  89  90  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia