• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2789

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings Parampalli, Udaya 9783642224966 Springer
Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings

ISBN: 9783642224966 / Angielski / Miękka / 464 str.

ISBN: 9783642224966/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Udaya Parampalli; Philip Hawkes
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne,...
cena: 202,66

Public Key Infrastructures, Services and Applications: 7th European Workshop, Europki 2010, Athens, Greece, September 23-24, 2010. Revised Selected Pa Camenisch, Jan 9783642226328 Springer
Public Key Infrastructures, Services and Applications: 7th European Workshop, Europki 2010, Athens, Greece, September 23-24, 2010. Revised Selected Pa

ISBN: 9783642226328 / Angielski / Miękka / 209 str.

ISBN: 9783642226328/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Costas Lambrinoudakis
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and App...
cena: 202,66

Einführung in Die Quanteninformatik: Quantenkryptografie, Teleportation Und Quantencomputing Brands, Gilbert 9783642206467 Springer
Einführung in Die Quanteninformatik: Quantenkryptografie, Teleportation Und Quantencomputing

ISBN: 9783642206467 / Niemiecki / Miękka / 374 str.

ISBN: 9783642206467/Niemiecki/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Brands
Ausgehend von der Theorie und den Protokollen der Quantenkryptografie werden in dem Band die Servicequalitaten vorgestellt, die angesichts der aktuellen technischen Moglichkeiten erreichbar sind. Unter Berucksichtigung wenig beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor die erreichbare Sicherheit und untersucht die Moglichkeiten des Quantencomputing. Anhand praxisnaher Aufgaben konnen Leser ihr Wissen vertiefen und lernen, die Techniken kritisch zu bewerten. Mit Programmieranleitung fur Simulationsversuche auf dem eigenen Rechner.
Ausgehend von der Theorie und den Protokollen der Quantenkryptografie werden in dem Band die Servicequalitaten vorgestellt, die angesichts der aktuell...
cena: 189,41

Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings Jan Camenisch, Simone Fischer-Hübner, Yuko Murayama, Armand Portmann, Carlos Rieder 9783642214233 Springer-Verlag Berlin and Heidelberg GmbH &
Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings

ISBN: 9783642214233 / Angielski / Twarda / 330 str.

ISBN: 9783642214233/Angielski/Twarda/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Simone Fischer-Hubner;Yuko Murayama
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion...
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switze...
cena: 202,66

Information Security and Cryptology Lai, Xuejia 9783642215179 Springer
Information Security and Cryptology

ISBN: 9783642215179 / Angielski / Miękka / 524 str.

ISBN: 9783642215179/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xuejia Lai; Moti Yung; Dongdai Lin
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, ...
cena: 202,66

Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings Simone Fischer-Hübner, Nicholas Hopper 9783642222627 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings

ISBN: 9783642222627 / Angielski / Miękka / 285 str.

ISBN: 9783642222627/Angielski/Miękka/285 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner;Nicholas Hopper

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business,...

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 r...

cena: 202,66

Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing 9783642209000 Springer-Verlag Berlin and Heidelberg GmbH &
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings

ISBN: 9783642209000 / Angielski / Miękka / 295 str.

ISBN: 9783642209000/Angielski/Miękka/295 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yeow Meng Chee;Zhenbo Guo;San Ling
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. This title covers a range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2...
cena: 202,66

Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings Qing, Sihan 9783642252426 Springer-Verlag Berlin and Heidelberg GmbH &
Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings

ISBN: 9783642252426 / Angielski / Miękka / 432 str.

ISBN: 9783642252426/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sihan Qing;Willy Susilo;Guilin Wang
Constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
Constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, Chi...
cena: 202,66

Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011, Proceedings Yang, Bo-Yin 9783642254048 Springer-Verlag Berlin and Heidelberg GmbH &
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011, Proceedings

ISBN: 9783642254048 / Angielski / Miękka / 295 str.

ISBN: 9783642254048/Angielski/Miękka/295 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bo-Yin Yang
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011. The 18 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems that have the potential to resist possible future quantum computers, classical and quantum attacks, and security models for the post-quantum era.
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, ...
cena: 202,66

Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner 9783642224430 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

ISBN: 9783642224430 / Angielski / Miękka / 271 str.

ISBN: 9783642224430/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jorge Cuellar;Javier Lopez;Gilles Barthe
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010...
cena: 202,66

Digital Identity and Access Management: Technologies and Frameworks Sharman, Raj 9781613504987 Business Science Reference
Digital Identity and Access Management: Technologies and Frameworks

ISBN: 9781613504987 / Angielski / Twarda / 428 str.

ISBN: 9781613504987/Angielski/Twarda/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raj Sharman;Sanjukta Das Smith;Manish Gupta
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
cena: 1002,13

Advances in Cryptology - ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, So Lee, Dong Hoon 9783642253843 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology - ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, So

ISBN: 9783642253843 / Angielski / Miękka / 760 str.

ISBN: 9783642253843/Angielski/Miękka/760 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dong Hoon Lee;Xiaoyun Wang
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature;...
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIAC...
cena: 202,66

Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Danezis, George 9783642275753 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected

ISBN: 9783642275753 / Angielski / Miękka / 332 str.

ISBN: 9783642275753/Angielski/Miękka/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Danezis
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and...
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Secu...
cena: 202,66

Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers Souhwan Jung, Moti Yung 9783642278891 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

ISBN: 9783642278891 / Angielski / Miękka / 271 str.

ISBN: 9783642278891/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Souhwan Jung;Moti Yung
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA ...
cena: 202,66

Security for Wireless Sensor Networks Using Identity-Based Cryptography Patil, Harsh Kupwade 9781439869017 Auerbach Publications
Security for Wireless Sensor Networks Using Identity-Based Cryptography

ISBN: 9781439869017 / Angielski / Twarda / 232 str.

ISBN: 9781439869017/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harsh Kupwade Patil; Stephen A. Szygenda

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer...

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele...

cena: 762,24

Hardware Security: Design, Threats, and Safeguards Mukhopadhyay, Debdeep 9781439895832 CRC Press
Hardware Security: Design, Threats, and Safeguards

ISBN: 9781439895832 / Angielski / Twarda / 590 str.

ISBN: 9781439895832/Angielski/Twarda/590 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive...

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical prin...

cena: 663,88

Anonymous Security Systems and Applications: Requirements and Solutions Tamura, Shinsuke 9781466616493 Information Science Reference
Anonymous Security Systems and Applications: Requirements and Solutions

ISBN: 9781466616493 / Angielski / Twarda / 266 str.

ISBN: 9781466616493/Angielski/Twarda/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shinsuke Tamura
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers' lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed...
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an...
cena: 1002,13

Post-Quantum Cryptography Using Complexity Dr Michael James D 9781469959139 Createspace
Post-Quantum Cryptography Using Complexity

ISBN: 9781469959139 / Angielski / Miękka / 144 str.

ISBN: 9781469959139/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael James De Mare
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
cena: 64,88

Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers Xenakis, Christos 9783642216930 Springer
Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers

ISBN: 9783642216930 / Angielski / Miękka / 160 str.

ISBN: 9783642216930/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christos Xenakis; Stephen Wolthusen
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRIT...
cena: 202,66

Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Joux, Antoine 9783642217012 Springer
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers

ISBN: 9783642217012 / Angielski / Miękka / 415 str.

ISBN: 9783642217012/Angielski/Miękka/415 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antoine Joux
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was hel...
cena: 202,66

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia