• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953081]
• Literatura piękna
 [1807186]

  więcej...
• Turystyka
 [52332]
• Informatyka
 [151352]
• Komiksy
 [36730]
• Encyklopedie
 [23076]
• Dziecięca
 [611400]
• Hobby
 [105092]
• AudioBooki
 [1722]
• Literatura faktu
 [191783]
• Muzyka CD
 [360]
• Słowniki
 [2970]
• Inne
 [439815]
• Kalendarze
 [655]
• Podręczniki
 [166156]
• Poradniki
 [422232]
• Religia
 [506466]
• Czasopisma
 [515]
• Sport
 [59946]
• Sztuka
 [242990]
• CD, DVD, Video
 [3439]
• Technologie
 [219109]
• Zdrowie
 [98416]
• Książkowe Klimaty
 [124]
• Zabawki
 [2537]
• Puzzle, gry
 [3685]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7832]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello 9783642316678 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

ISBN: 9783642316678 / Angielski / Twarda / 294 str.

ISBN: 9783642316678/Angielski/Twarda/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Bruno Crispo;Simone Fischer-Hubner
Constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011.
Constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Tren...
cena: 204,55

Mobile Authentication: Problems and Solutions Jakobsson, Markus 9781461448778 Springer
Mobile Authentication: Problems and Solutions

ISBN: 9781461448778 / Angielski / Miękka / 113 str.

ISBN: 9781461448778/Angielski/Miękka/113 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Jakobsson
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine...
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-mach...
cena: 204,55

Security and Privacy in Communication Networks: 7th International Icst Conference, Securecomm 2011, London, September 7-9, 2011, Revised Selected Pape Rajarajan, Muttukrishnan 9783642319082 Springer
Security and Privacy in Communication Networks: 7th International Icst Conference, Securecomm 2011, London, September 7-9, 2011, Revised Selected Pape

ISBN: 9783642319082 / Angielski / Miękka / 548 str.

ISBN: 9783642319082/Angielski/Miękka/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Muttukrishnan Rajarajan; Fred Piper; Haining Wang
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2...
cena: 204,55

Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers Kim, Howon 9783642319112 Springer
Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

ISBN: 9783642319112 / Angielski / Miękka / 512 str.

ISBN: 9783642319112/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Howon Kim
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and...
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held...
cena: 204,55

Eco-Friendly Computing and Communication Systems: International Conference, Iceccs 2012, Kochi, India, August 9-11, 2012. Proceedings Mathew, Jimson 9783642321115 Springer
Eco-Friendly Computing and Communication Systems: International Conference, Iceccs 2012, Kochi, India, August 9-11, 2012. Proceedings

ISBN: 9783642321115 / Angielski / Miękka / 444 str.

ISBN: 9783642321115/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jimson Mathew; Priyadarshan Patra; D. K. Pradhan
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications; wireless communication systems; green energy technologies; image and signal processing; bioinformatics and emerging technologies; secure and reliable systems; mathematical modeling and scientific computing; pervasive...
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in ...
cena: 204,55

Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings Fischer-Hübner, Simone 9783642322860 Springer
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings

ISBN: 9783642322860 / Angielski / Miękka / 242 str.

ISBN: 9783642322860/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-H Bner; Sokratis Katsikas; Gerald Quirchmayr
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vi...
cena: 188,22

Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781461454151 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

ISBN: 9781461454151 / Angielski / Twarda / 204 str.

ISBN: 9781461454151/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; V. S. Subrahmanian

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 409,14

Multidisciplinary Research and Practice for Informations Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross Domain Conference and Workshop on Availab Quirchmayer, Gerald 9783642324970 Springer
Multidisciplinary Research and Practice for Informations Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross Domain Conference and Workshop on Availab

ISBN: 9783642324970 / Angielski / Miękka / 683 str.

ISBN: 9783642324970/Angielski/Miękka/683 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerald Quirchmayer; Josef Basl; Ilsun You
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and...
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Relia...
cena: 409,14

E-Voting and Identity: Third International Conference, Voteid 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers Kiayias, Aggelos 9783642327469 Springer
E-Voting and Identity: Third International Conference, Voteid 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers

ISBN: 9783642327469 / Angielski / Miękka / 257 str.

ISBN: 9783642327469/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Helger Lipmaa
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Ta...
cena: 188,22

Ethical and Social Issues in the Information Age Kizza, Joseph Migga 9781447125457 Springer, Berlin
Ethical and Social Issues in the Information Age

ISBN: 9781447125457 / Angielski / Miękka / 335 str.

ISBN: 9781447125457/Angielski/Miękka/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph Migga Kizza
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is...
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First...
cena: 204,39

Computer Security -- Esorics 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings Foresti, Sara 9783642331664 Springer
Computer Security -- Esorics 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

ISBN: 9783642331664 / Angielski / Miękka / 896 str.

ISBN: 9783642331664/Angielski/Miękka/896 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti; Moti Yung; Fabio Martinelli
Constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
Constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
cena: 204,55

Provable Security: 6th International Conference, Provsec 2012, Chengdu, China, September 26-28, 2012, Proceedings Takagi, Tsuyoshi 9783642332715 Springer
Provable Security: 6th International Conference, Provsec 2012, Chengdu, China, September 26-28, 2012, Proceedings

ISBN: 9783642332715 / Angielski / Miękka / 337 str.

ISBN: 9783642332715/Angielski/Miękka/337 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tsuyoshi Takagi; Guilin Wang; Zhiguang Qin
Constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
Constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012...
cena: 204,55

Kryptologie: Eine Einführung in Die Wissenschaft Vom Verschlüsseln, Verbergen Und Verheimlichen. Ohne Alle Geheimniskrämerei, Aber Beutelspacher, Albrecht 9783528189907 Vieweg+teubner Verlag
Kryptologie: Eine Einführung in Die Wissenschaft Vom Verschlüsseln, Verbergen Und Verheimlichen. Ohne Alle Geheimniskrämerei, Aber

ISBN: 9783528189907 / Niemiecki / Miękka / 179 str.

ISBN: 9783528189907/Niemiecki/Miękka/179 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Albrecht Beutelspacher
Aut prodesse volunt aut delectare poetae aut simul et iucunda et idonea dicere vitae. (Horaz) Seit es mit Sprache begabte Lebewesen gibt, gibt es auch vertrauliche Mit teilungen, also Mitteilungen, die nur fur eine einzige Person oder nur fur einen ganz bestimmten Personenkreis gedacht sind, und von denen Aussen stehende keine Kenntnis erhalten sollen. Wie kann eine Nachricht 'sicher' ubermittelt werden, also so, dass kein Unbefugter Kenntnis vom Inhalt dieser Nachricht erhalt? Eine damit zu sammenhangende, fast noch wichtigere Frage ist die folgende: Wie kann man erreichen, dass die...
Aut prodesse volunt aut delectare poetae aut simul et iucunda et idonea dicere vitae. (Horaz) Seit es mit Sprache begabte Lebewesen gibt, gibt es auch...
cena: 210,28

Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings Goichiro Hanaoka, Toshihiro Yamauchi 9783642341168 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings

ISBN: 9783642341168 / Angielski / Miękka / 261 str.

ISBN: 9783642341168/Angielski/Miękka/261 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Goichiro Hanaoka;Toshihiro Yamauchi
Constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012.
Constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012.
cena: 188,22

Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings Chim, Tat Wing 9783642341281 Springer
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings

ISBN: 9783642341281 / Angielski / Miękka / 506 str.

ISBN: 9783642341281/Angielski/Miękka/506 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tat Wing Chim; Tsz Hon Yuen
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Ho...
cena: 204,55

Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc Thampi, Sabu M. 9783642341342 Springer
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc

ISBN: 9783642341342 / Angielski / Miękka / 532 str.

ISBN: 9783642341342/Angielski/Miękka/532 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sabu M. Thampi; Albert Y. Zomaya; Thorsten Strufe
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in T...
cena: 204,55

Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings Audun Jøsang, Bengt Carlsson 9783642342097 Springer-Verlag Berlin and Heidelberg GmbH &
Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings

ISBN: 9783642342097 / Angielski / Miękka / 247 str.

ISBN: 9783642342097/Angielski/Miękka/247 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Audun Jøsang;Bengt Carlsson
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in Octobe...
cena: 188,22

Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie Bauer, Friedrich L. 9783642975806 Springer
Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie

ISBN: 9783642975806 / Niemiecki / Miękka / 403 str.

ISBN: 9783642975806/Niemiecki/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Friedrich L. Bauer
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihrer Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("offentliche Schlussel") treten zusehends rechnerinterne Anwendungen, die sich auch auf Zugriffsberechtigungen und den Quellenschutz von Software erstrecken.
Der erste Teil des Buches handelt in elf Kapiteln von den Geheimschriften und ihrem Gebrauch - von der Kryptographie. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum...
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationsweg...
cena: 204,55

Advanced Statistical Steganalysis Rainer B 9783642264504 Springer
Advanced Statistical Steganalysis

ISBN: 9783642264504 / Angielski / Miękka / 288 str.

ISBN: 9783642264504/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rainer B. Hme
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ste...
cena: 613,74

Progress in Cryptology - INDOCRYPT 2012: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Ko Steven Galbraith, Mridul Nandi 9783642349300 Springer-Verlag Berlin and Heidelberg GmbH &
Progress in Cryptology - INDOCRYPT 2012: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Ko

ISBN: 9783642349300 / Angielski / Miękka / 566 str.

ISBN: 9783642349300/Angielski/Miękka/566 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Galbraith;Mridul Nandi
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in...
cena: 204,55

Pierwsza Podprzednia  124  125  126  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia