• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2786

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers Christianson, Bruce 9783642258664 Springer, Berlin
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers

ISBN: 9783642258664 / Angielski / Miękka / 383 str.

ISBN: 9783642258664/Angielski/Miękka/383 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
cena: 204,55

Multiple-Base Number System: Theory and Applications Dimitrov, Vassil 9781439830468 Circuits and Electrical Engineering
Multiple-Base Number System: Theory and Applications

ISBN: 9781439830468 / Angielski / Twarda / 294 str.

ISBN: 9781439830468/Angielski/Twarda/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vassil Dimitrov; Graham A. Jullien; Roberto Muscedere

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily available standard arithmetic hardware might not necessarily be the most efficient implementation strategy.

Multiple-Base Number System: Theory and Applications stands apart from the usual books on computer arithmetic with its concentration on the uses and the...

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the a...

cena: 1162,69

The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September Matyás, Vashek 9783642242311 Springer-Verlag Berlin and Heidelberg GmbH &
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September

ISBN: 9783642242311 / Angielski / Miękka / 283 str.

ISBN: 9783642242311/Angielski/Miękka/283 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vashek Matyas;Simone Fischer-Hubner;Daniel Cvrcek
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
cena: 409,14

European Axis Signal Intelligence in World War II National Security Agency                 Army Security Agency 9781608880089 Nimble Books
European Axis Signal Intelligence in World War II

ISBN: 9781608880089 / Angielski / Twarda / 1120 str.

ISBN: 9781608880089/Angielski/Twarda/1120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
National Security Agency;Army Security Agency
An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the...

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army...
cena: 436,59

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201 Holz, Thorsten 9783642224232 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201

ISBN: 9783642224232 / Angielski / Miękka / 235 str.

ISBN: 9783642224232/Angielski/Miękka/235 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thorsten Holz; Herbert Bos
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessmen...
cena: 204,55

Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings Alcaraz Calero, Jose M. 9783642234958 Springer
Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings

ISBN: 9783642234958 / Angielski / Miękka / 258 str.

ISBN: 9783642234958/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose M. Alcaraz Calero; Laurence T. Yang; Felix Gomez Marmol
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada...
cena: 204,55

Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings Sommer, Robin 9783642236433 Springer
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings

ISBN: 9783642236433 / Angielski / Miękka / 399 str.

ISBN: 9783642236433/Angielski/Miękka/399 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer; Davide Balzarotti; Gregor Maier
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
cena: 204,55

Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, Butts, Jonathan 9783642248634 Springer
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa,

ISBN: 9783642248634 / Angielski / Twarda / 218 str.

ISBN: 9783642248634/Angielski/Twarda/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Butts; Sujeet Shenoi
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure...
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every se...
cena: 204,55

Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers Bouvry, Pascal 9783642252600 Springer
Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers

ISBN: 9783642252600 / Angielski / Miękka / 400 str.

ISBN: 9783642252600/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pascal Bouvry; Mieczyslaw A. Klopotek; Franck Leprevost
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and ...
cena: 204,55

Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit Kim, Tai-hoon 9783642271885 Springer
Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit

ISBN: 9783642271885 / Angielski / Miękka / 252 str.

ISBN: 9783642271885/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tai-hoon Kim; Hojjat Adeli; Wai-Chi Fang
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology.
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Confe...
cena: 204,55

Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re Prouff, Emmanuel 9783642272561 Springer
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re

ISBN: 9783642272561 / Angielski / Miękka / 335 str.

ISBN: 9783642272561/Angielski/Miękka/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emmanuel Prouff
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research...
cena: 204,55

Crittografia Nel Paese Delle Meraviglie Venturi, Daniele 9788847024809 Springer
Crittografia Nel Paese Delle Meraviglie

ISBN: 9788847024809 / Włoski / Miękka / 500 str.

ISBN: 9788847024809/Włoski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniele Venturi

In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati. Oggi, l evoluzione dei sistemi digitali ha generato nuovi scenari di comunicazione, richiedendo ai moderni crittografi di progettare crittosistemi che soddisfino requisiti di sicurezza complessi, ben oltre il requisito base di confidenzialita ottenibile attraverso la scrittura nascosta .

Tuttavia, l analisi di sicurezza di questi schemi crittografici (fino ai primi anni 80)...

In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il conte...

cena: 184,10

Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings Cuzzocrea, Alfredo 9783642235436 Springer-Verlag Berlin and Heidelberg GmbH &
Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings

ISBN: 9783642235436 / Angielski / Miękka / 498 str.

ISBN: 9783642235436/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011. The 37 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on physical and conceptual data warehouse models, data warehousing design methodologies and tools, data warehouse performance and optimization, pattern mining, matrix-based mining techniques and stream, sensor and time-series mining.
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in To...
cena: 204,55

Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense Lopez, Javier 9783642289194 Springer
Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

ISBN: 9783642289194 / Angielski / Miękka / 357 str.

ISBN: 9783642289194/Angielski/Miękka/357 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Javier Lopez; Roberto Setola; Stephen Wolthusen
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one...
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critic...
cena: 347,77

Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U Pointcheval, David 9783642290107 Springer
Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U

ISBN: 9783642290107 / Angielski / Miękka / 758 str.

ISBN: 9783642290107/Angielski/Miękka/758 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Pointcheval; Thomas Johansson
Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT...
cena: 204,55

Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers Peeter Laud 9783642296147 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

ISBN: 9783642296147 / Angielski / Miękka / 273 str.

ISBN: 9783642296147/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peeter Laud
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
cena: 204,55

Cyber Situational Awareness: Issues and Research Jajodia, Sushil 9781461424758 Springer, Berlin
Cyber Situational Awareness: Issues and Research

ISBN: 9781461424758 / Angielski / Miękka / 252 str.

ISBN: 9781461424758/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
cena: 409,14

Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings Helleseth, Tor 9783642306143 Springer
Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings

ISBN: 9783642306143 / Angielski / Miękka / 337 str.

ISBN: 9783642306143/Angielski/Miękka/337 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tor Helleseth; Jonathan Jedwab
Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. This title includes papers that are grouped in topical sections on: perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; and, more.
Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. T...
cena: 204,55

Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang 9783642309205 Springer-Verlag Berlin and Heidelberg GmbH &
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

ISBN: 9783642309205 / Angielski / Miękka / 341 str.

ISBN: 9783642309205/Angielski/Miękka/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Katzenbeisser;Edgar Weippl;L. Jean Camp
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in June 2012.
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in...
cena: 204,55

Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings Susilo, Willy 9783642314476 Springer
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

ISBN: 9783642314476 / Angielski / Miękka / 460 str.

ISBN: 9783642314476/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Yi Mu; Jennifer Seberry
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...
cena: 204,55

Pierwsza Podprzednia  124  125  126  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia