• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2769

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010 Giese, Holger 9783642135552 Springer
Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010

ISBN: 9783642135552 / Angielski / Miękka / 205 str.

ISBN: 9783642135552/Angielski/Miękka/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Holger Giese
Architecting critical systems has gained major importance in commercial, g- ernmentalandindustrialsectors. Emergingsoftwareapplicationsencompasscr- icalities that are associated with either the whole system or some of its com- nents. Therefore, e?ective methods, techniques, and tools for constructing, te- ing, analyzing, and evaluating the architectures for critical systems are of major importance. Furthermore, these methods, techniques and tools must address - sues of dependability and security, while focusing not only on the development, but also on the deployment and evolution of the...
Architecting critical systems has gained major importance in commercial, g- ernmentalandindustrialsectors. Emergingsoftwareapplicationsencompasscr- ic...
cena: 200,77

 Arithmetic of Finite Fields: Third International Workshop, Waifi 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings Hasan, M. Anwar 9783642137969 Springer
Arithmetic of Finite Fields: Third International Workshop, Waifi 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings

ISBN: 9783642137969 / Angielski / Miękka / 280 str.

ISBN: 9783642137969/Angielski/Miękka/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Anwar Hasan; Tor Helleseth
These are the proceedings of WAIFI 2010, the Third International Workshop on theArithmeticofFiniteFields, heldinIstanbul, Turkey, duringJune27-30,2010. The ?rst workshop, WAIFI 2007, was held in Madrid, Spain, and then WAIFI 2008 was held in Siena, Italy. In 2008, the workshop series was made biannual and it is now being held every even year, bringing together mathematicians, computer scientists, engineers and physicists who are doing research on various aspects of ?nite ?eld arithmetic. This year the workshop received 33 submissions, each of which was reviewed by at least three reviewerswho...
These are the proceedings of WAIFI 2010, the Third International Workshop on theArithmeticofFiniteFields, heldinIstanbul, Turkey, duringJune27-30,2010...
cena: 200,77

 Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper de Capitani Di Vimercati, Sabrina 9783642400117 Springer
Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper

ISBN: 9783642400117 / Angielski / Miękka / 195 str.

ISBN: 9783642400117/Angielski/Miękka/195 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sabrina de Capitani Di Vimercati; Chris Mitchell

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.


This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in Septe...

cena: 184,75

 Personal Satellite Services: Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010, Revised Selected Papers Sithamparanathan, Kandeepan 9783642136177 Not Avail
Personal Satellite Services: Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010, Revised Selected Papers

ISBN: 9783642136177 / Angielski / Miękka / 454 str.

ISBN: 9783642136177/Angielski/Miękka/454 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kandeepan Sithamparanathan
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010. The conference included a keynote speech, 4 regular technical tracks and 4 special sessions consisting of 33 high-quality scientific papers. These cover various topics such as Satellite Communications: Coding and Modulations, Multimedia Integration, Satellite Network: Quality of Service and Architectures and Applications and Services, as well as Delay-Tolerant Networks, Quantum Satellite...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, ...
cena: 200,77

 Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 Eindhoven, The Netherlands, November 5-6, 2009 Revised Selected Papers Degano, Pierpaolo 9783642124587 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 Eindhoven, The Netherlands, November 5-6, 2009 Revised Selected Papers

ISBN: 9783642124587 / Angielski / Miękka / 279 str.

ISBN: 9783642124587/Angielski/Miękka/279 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
¬Abar;¬Abar
The present volume contains the proceedings of the 6th International workshop on Formal Aspects of Security and Trust (fast 2009), held in Eindhoven, The Netherlands, 5-6 November 2009, as part of Formal Methods Week 2009. fast is sponsored by IFIP WG 1.7 on Foundations of Security Analysis and Design. The previous ?ve fast workshop editions have fostered cooperation among researchers in the areas of security and trust, and we aimed to continue this tradition. As computing and networkinfrastructures become increasingly per- sive, and as they carry increasing economic activity, society needs...
The present volume contains the proceedings of the 6th International workshop on Formal Aspects of Security and Trust (fast 2009), held in Eindhoven, ...
cena: 200,77

 Security and Policy Driven Computing Lei Liu   9781439825792 Taylor and Francis
Security and Policy Driven Computing

ISBN: 9781439825792 / Angielski / Twarda / 290 str.

ISBN: 9781439825792/Angielski/Twarda/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lei Liu;¬Abar;¬Abar
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses...
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author i...
cena: 825,84

 Recent Trends in Network Security and Applications: Third International Conference, Cnsa 2010, Chennai, India, July 23-25, 2010 Proceedings Meghanathan, Natarajan 9783642144776 Not Avail
Recent Trends in Network Security and Applications: Third International Conference, Cnsa 2010, Chennai, India, July 23-25, 2010 Proceedings

ISBN: 9783642144776 / Angielski / Miękka / 636 str.

ISBN: 9783642144776/Angielski/Miękka/636 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Natarajan Meghanathan; Selma Boumerdassi; Nabendu Chaki
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing...
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its...
cena: 401,58

 Algorithmic Number Theory: 9th International Symposium, Ants-IX, Nancy, France, July 19-23, 2010, Proceedings Hanrot, Guillaume 9783642145179 Not Avail
Algorithmic Number Theory: 9th International Symposium, Ants-IX, Nancy, France, July 19-23, 2010, Proceedings

ISBN: 9783642145179 / Angielski / Miękka / 397 str.

ISBN: 9783642145179/Angielski/Miękka/397 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guillaume Hanrot
Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. This book features the papers that are devoted to algorithmic aspects of number theory, including elementary number theory, algebraic number theory, analytic number theory, and more.
Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. Thi...
cena: 200,77

 Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Sion, Radu 9783642149917 Not Avail
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised

ISBN: 9783642149917 / Angielski / Twarda / 257 str.

ISBN: 9783642149917/Angielski/Twarda/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Radu Sion; Reza Curtmola; Sven Dietrich
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world...
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conferenc...
cena: 200,77

 Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings Nishigaki, Masakatsu 9783642134456 Not Avail
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings

ISBN: 9783642134456 / Angielski / Twarda / 276 str.

ISBN: 9783642134456/Angielski/Twarda/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masakatsu Nishigaki; Audun Josang; Yuko Murayama
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue...
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan...
cena: 200,77

 Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings Katsikas, Sokratis 9783642151514 Not Avail
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings

ISBN: 9783642151514 / Angielski / Miękka / 252 str.

ISBN: 9783642151514/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sokratis Katsikas; Javier Lopez; Miguel Soriano
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this 'information...
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bil...
cena: 200,77

 Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings Tenreiro de Magalhaes, Sergio 9783642157165 Not Avail
Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings

ISBN: 9783642157165 / Angielski / Miękka / 301 str.

ISBN: 9783642157165/Angielski/Miękka/301 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sergio Tenreiro De Magalhaes; Hamid Jahankhani; Ali G. Hessami
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and...
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sus...
cena: 200,77

 New Technologies for Digital Crime and Forensics: Devices, Applications, and Software Li, Chang-Tsun 9781609605155 Information Science Publishing
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software

ISBN: 9781609605155 / Angielski / Twarda / 374 str.

ISBN: 9781609605155/Angielski/Twarda/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chang-Tsun Li; Anthony T. S. Ho
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities. This field is under constant evolution as the nature of digital crime continues to change and new methods for tracking and preventing digital attacks are developed.
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevent...
cena: 897,39

 Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Rannenberg, Kai 9783642152566 Not Avail
Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010,

ISBN: 9783642152566 / Angielski / Twarda / 332 str.

ISBN: 9783642152566/Angielski/Twarda/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai Rannenberg; Vijay Varadharajan; Christian Weber
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for...
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceeding...
cena: 200,77

 What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience Berleur, Jacques J. 9783642154782 Not Avail
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience

ISBN: 9783642154782 / Angielski / Miękka / 416 str.

ISBN: 9783642154782/Angielski/Miękka/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jacques J. Berleur; Magda David Hercheui; Lorenz M. Hilty
The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organised by the International Federation for Information Processing (IFIP). In the first part, the reader can find the proceedings of the 9th Human Choice and Computers International C- ference (HCC9) organised by the IFIP Technical Committee TC9 on the Relationship Between ICT and Society. The HCC9 part is subdivided into four tracks: Ethics and ICT Governance, Virtual Technologies and Social Shaping, Surveillance and Privacy, and ICT and Sustainable...
The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organis...
cena: 401,58

 Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings Gritzalis, Dimitris 9783642154966 Not Avail
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

ISBN: 9783642154966 / Angielski / Miękka / 718 str.

ISBN: 9783642154966/Angielski/Miękka/718 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was...
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the internation...
cena: 401,58

 Privacy, Security and Trust Within the Context of Pervasive Computing Robinson, Philip 9781441936295 Not Avail
Privacy, Security and Trust Within the Context of Pervasive Computing

ISBN: 9781441936295 / Angielski / Miękka / 171 str.

ISBN: 9781441936295/Angielski/Miękka/171 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philip Robinson

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic"...

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second i...

cena: 401,58

 Semistructured Database Design Tok Wang Ling Gillian Dobbie 9781441936387 Not Avail
Semistructured Database Design

ISBN: 9781441936387 / Angielski / Miękka / 178 str.

ISBN: 9781441936387/Angielski/Miękka/178 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tok Wang Ling; Gillian Dobbie

Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design efficient databases.

This volume responds to that need by describing a semantically rich data model for semistructured data, called Object-Relationship-Attribute model for Semistructured data (ORA-SS). Focusing on this new model, the book discusses problems and presents solutions for a number of topics,...

Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructure...

cena: 401,58

 Security in E-Learning Edgar R. Weippl 9781441937223 Not Avail
Security in E-Learning

ISBN: 9781441937223 / Angielski / Miękka / 185 str.

ISBN: 9781441937223/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edgar R. Weippl

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this...

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this...

cena: 401,58

 Kryptografie in Theorie Und Praxis: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld Beutelspacher, Albrecht 9783834809773 Vieweg+Teubner
Kryptografie in Theorie Und Praxis: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld

ISBN: 9783834809773 / Niemiecki / Miękka / 324 str.

ISBN: 9783834809773/Niemiecki/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Albrecht Beutelspacher; Heike B. Neumann; Thomas Schwarzpaul
Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad...
Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. D...
cena: 187,64

Pierwsza Podprzednia  91  92  93  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia