• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953081]
• Literatura piękna
 [1807186]

  więcej...
• Turystyka
 [52332]
• Informatyka
 [151352]
• Komiksy
 [36730]
• Encyklopedie
 [23076]
• Dziecięca
 [611400]
• Hobby
 [105092]
• AudioBooki
 [1722]
• Literatura faktu
 [191783]
• Muzyka CD
 [360]
• Słowniki
 [2970]
• Inne
 [439815]
• Kalendarze
 [655]
• Podręczniki
 [166156]
• Poradniki
 [422232]
• Religia
 [506466]
• Czasopisma
 [515]
• Sport
 [59946]
• Sztuka
 [242990]
• CD, DVD, Video
 [3439]
• Technologie
 [219109]
• Zdrowie
 [98416]
• Książkowe Klimaty
 [124]
• Zabawki
 [2537]
• Puzzle, gry
 [3685]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7832]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2788

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie Bauer, Friedrich L. 9783642975806 Springer
Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie

ISBN: 9783642975806 / Niemiecki / Miękka / 403 str.

ISBN: 9783642975806/Niemiecki/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Friedrich L. Bauer
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihrer Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("offentliche Schlussel") treten zusehends rechnerinterne Anwendungen, die sich auch auf Zugriffsberechtigungen und den Quellenschutz von Software erstrecken.
Der erste Teil des Buches handelt in elf Kapiteln von den Geheimschriften und ihrem Gebrauch - von der Kryptographie. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum...
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationsweg...
cena: 204,55

 Advanced Statistical Steganalysis Rainer B 9783642264504 Springer
Advanced Statistical Steganalysis

ISBN: 9783642264504 / Angielski / Miękka / 288 str.

ISBN: 9783642264504/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rainer B. Hme
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers.
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ste...
cena: 613,74

 Progress in Cryptology - INDOCRYPT 2012: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Ko Steven Galbraith, Mridul Nandi 9783642349300 Springer-Verlag Berlin and Heidelberg GmbH &
Progress in Cryptology - INDOCRYPT 2012: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Ko

ISBN: 9783642349300 / Angielski / Miękka / 566 str.

ISBN: 9783642349300/Angielski/Miękka/566 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Galbraith;Mridul Nandi
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in...
cena: 204,55

 Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings Venkat Venkatakrishnan, Diganta Goswami 9783642351297 Springer-Verlag Berlin and Heidelberg GmbH &
Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings

ISBN: 9783642351297 / Angielski / Miękka / 353 str.

ISBN: 9783642351297/Angielski/Miękka/353 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Venkat Venkatakrishnan;Diganta Goswami
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, Indi...
cena: 204,55

 Computer Applications for Security, Control and System Engineering: International Conferences, Sectech, Ca, Ces3 2012, Held in Conjunction with Gst 20 Kim, Tai-hoon 9783642352638 Springer
Computer Applications for Security, Control and System Engineering: International Conferences, Sectech, Ca, Ces3 2012, Held in Conjunction with Gst 20

ISBN: 9783642352638 / Angielski / Miękka / 492 str.

ISBN: 9783642352638/Angielski/Miękka/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tai-hoon Kim; Adrian Stoica; Wai-Chi Fang
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication,...
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 20...
cena: 204,55

 Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings Xiang, Yang 9783642353611 Springer
Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings

ISBN: 9783642353611 / Angielski / Miękka / 510 str.

ISBN: 9783642353611/Angielski/Miękka/510 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yang Xiang; Javier Lopez; C. -C Jay Kuo
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Aus...
cena: 204,55

 Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis 9783642354038 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

ISBN: 9783642354038 / Angielski / Miękka / 311 str.

ISBN: 9783642354038/Angielski/Miękka/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pieprzyk;Ahmad-Reza Sadeghi;Mark Manulis
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.
This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Aus...
cena: 204,55

 Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers Dong Hoon Lee, Moti Yung 9783642354151 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

ISBN: 9783642354151 / Angielski / Miękka / 371 str.

ISBN: 9783642354151/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dong Hoon Lee;Moti Yung
Constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
Constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held...
cena: 204,55

 Spyware and Adware Aycock, John 9781461426837 Springer, Berlin
Spyware and Adware

ISBN: 9781461426837 / Angielski / Miękka / 146 str.

ISBN: 9781461426837/Angielski/Miękka/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Aycock

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.


Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. ...

cena: 409,14

 Adaptive Cryptographic Access Control Kayem, Anne V. D. M.; Akl, Selim G.; Martin, Patrick 9781461426424 Springer, Berlin
Adaptive Cryptographic Access Control

ISBN: 9781461426424 / Angielski / Miękka / 138 str.

ISBN: 9781461426424/Angielski/Miękka/138 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anne V. D. M. Kayem; Selim G. Akl; Patrick Martin

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control...

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct...

cena: 409,14

 Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers Anne Canteaut 9783642340468 Springer-Verlag Berlin and Heidelberg GmbH &
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers

ISBN: 9783642340468 / Angielski / Miękka / 463 str.

ISBN: 9783642340468/Angielski/Miękka/463 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anne Canteaut
Constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012.
Constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC...
cena: 204,55

 Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers Lars R. Knudsen, Huapeng Wu 9783642359989 Springer-Verlag Berlin and Heidelberg GmbH &
Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers

ISBN: 9783642359989 / Angielski / Miękka / 407 str.

ISBN: 9783642359989/Angielski/Miękka/407 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lars R. Knudsen;Huapeng Wu
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC ...
cena: 204,55

 Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings Ed Dawson 9783642360947 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

ISBN: 9783642360947 / Angielski / Miękka / 405 str.

ISBN: 9783642360947/Angielski/Miękka/405 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ed Dawson
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, i...
cena: 204,55

 Radio Frequency Identification: Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers Jaap-Henk Hoepman, Ingrid Verbauwhede 9783642361395 Springer-Verlag Berlin and Heidelberg GmbH &
Radio Frequency Identification: Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers

ISBN: 9783642361395 / Angielski / Miękka / 181 str.

ISBN: 9783642361395/Angielski/Miękka/181 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jaap-Henk Hoepman;Ingrid Verbauwhede
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and ...
cena: 188,22

 
Handbook of Finite Fields

ISBN: 9781439873786 / Angielski / Twarda / 1068 str.

ISBN: 9781439873786/Angielski/Twarda/1068 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gary L. Mullen; Daniel Panario

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and format throughout and each chapter is self contained and peer reviewed.

The first part of the book traces the history of finite fields through the eighteenth and nineteenth centuries. The second part presents theoretical properties of...

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applic...

cena: 1169,72

 Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson 9783642356933 Springer-Verlag Berlin and Heidelberg GmbH &
Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers

ISBN: 9783642356933 / Angielski / Miękka / 277 str.

ISBN: 9783642356933/Angielski/Miękka/277 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson;James Malcolm;Frank Stajano
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life."
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, U...
cena: 188,22

 Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers Michel Abdalla, Tanja Lange 9783642363337 Springer-Verlag Berlin and Heidelberg GmbH &
Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

ISBN: 9783642363337 / Angielski / Miękka / 333 str.

ISBN: 9783642363337/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla;Tanja Lange
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software,...
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germa...
cena: 204,55

 Security and Privacy for Implantable Medical Devices Wayne Burleson Wayne Burleson Sandro Carrara 9781461416739 Springer
Security and Privacy for Implantable Medical Devices

ISBN: 9781461416739 / Angielski / Twarda / 205 str.

ISBN: 9781461416739/Angielski/Twarda/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wayne Burleson; Wayne Burleson; Sandro Carrara
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts...
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable m...
cena: 409,14

 Public-Key Cryptography -- PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 -- March 1, 2013, Proceedings Kaoru Kurosawa, Goichiro Hanaoka 9783642363610 Springer-Verlag Berlin and Heidelberg GmbH &
Public-Key Cryptography -- PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 -- March 1, 2013, Proceedings

ISBN: 9783642363610 / Angielski / Miękka / 518 str.

ISBN: 9783642363610/Angielski/Miękka/518 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaoru Kurosawa;Goichiro Hanaoka
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held ...
cena: 204,55

 Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings Amit Sahai 9783642365935 Springer-Verlag Berlin and Heidelberg GmbH &
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings

ISBN: 9783642365935 / Angielski / Miękka / 726 str.

ISBN: 9783642365935/Angielski/Miękka/726 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amit Sahai
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations...
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013...
cena: 204,55

Pierwsza Podprzednia  127  128  129  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia