• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2789

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Secure Data Managment: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings Willem Jonker, Milan Petkovic 9783642235559 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Data Managment: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings

ISBN: 9783642235559 / Angielski / Miękka / 170 str.

ISBN: 9783642235559/Angielski/Miękka/170 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker;Milan Petkovic
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a s...
cena: 202,66

Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday Naccache, David 9783642283673 Springer
Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

ISBN: 9783642283673 / Angielski / Miękka / 502 str.

ISBN: 9783642283673/Angielski/Miękka/502 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Naccache
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as...
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all ove...
cena: 202,66

Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - Pierpaolo Degano, Joshua D. Guttman 9783642286407 Springer-Verlag Berlin and Heidelberg GmbH &
Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 -

ISBN: 9783642286407 / Angielski / Miękka / 431 str.

ISBN: 9783642286407/Angielski/Miękka/431 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pierpaolo Degano;Joshua D. Guttman
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security,...
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, ...
cena: 202,66

Transactions on Data Hiding and Multimedia Security VII Yun Qing Shi 9783642286926 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security VII

ISBN: 9783642286926 / Angielski / Miękka / 115 str.

ISBN: 9783642286926/Angielski/Miękka/115 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Qing Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
cena: 202,66

Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings Cramer, Ronald 9783642289132 Springer
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

ISBN: 9783642289132 / Angielski / Miękka / 656 str.

ISBN: 9783642289132/Angielski/Miękka/656 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ronald Cramer
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
cena: 202,66

Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings Ryan, Mark D. 9783642291005 Springer
Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings

ISBN: 9783642291005 / Angielski / Miękka / 406 str.

ISBN: 9783642291005/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark D. Ryan; Ben Smyth; Guilin Wang
Constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
Constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou...
cena: 202,66

Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers Gilles Barthe, Anupam Datta, Sandro Etalle 9783642294198 Springer-Verlag Berlin and Heidelberg GmbH &
Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers

ISBN: 9783642294198 / Angielski / Miękka / 279 str.

ISBN: 9783642294198/Angielski/Miękka/279 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilles Barthe;Anupam Datta;Sandro Etalle
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, F...
cena: 202,66

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Raggo, Michael T. 9781597497435 SYNGRESS MEDIA
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

ISBN: 9781597497435 / Angielski / Miękka / 350 str.

ISBN: 9781597497435/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Raggo

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel...

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, t...

cena: 196,65

The LLL Algorithm: Survey and Applications Nguyen, Phong Q. 9783642261640 Springer, Berlin
The LLL Algorithm: Survey and Applications

ISBN: 9783642261640 / Angielski / Miękka / 496 str.

ISBN: 9783642261640/Angielski/Miękka/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately recognized as one of the most important algorithmic achievements of the twentieth century, because of its broad applicability and apparent simplicity. Its popularity has kept growing since, as testi ed by the hundreds of citations of the original article, and the ever more frequent use of LLL as a...
Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led t...
cena: 932,39

Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap Danezis, George 9783642298882 Springer
Financial Cryptography and Data Security: FC 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Pap

ISBN: 9783642298882 / Angielski / Miękka / 185 str.

ISBN: 9783642298882/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Danezis; Sven Dietrich; Kazue Sako
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial...
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Se...
cena: 202,66

Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers Catherine A. Meadows, Carmen Fernandez-Gago 9783642299629 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

ISBN: 9783642299629 / Angielski / Miękka / 239 str.

ISBN: 9783642299629/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine A. Meadows;Carmen Fernandez-Gago
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011...
cena: 202,66

Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 20 Fischlin, Marc 9783642300561 Springer
Public Key Cryptography - PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 20

ISBN: 9783642300561 / Angielski / Miękka / 734 str.

ISBN: 9783642300561/Angielski/Miękka/734 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Fischlin; Johannes Buchmann; Mark Manulis
Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. This title features papers that are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, and more.
Constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmsta...
cena: 202,66

Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, Gritzalis, Dimitris 9783642304354 Springer
Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6,

ISBN: 9783642304354 / Angielski / Twarda / 610 str.

ISBN: 9783642304354/Angielski/Twarda/610 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, ...
cena: 405,36

Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings Fischer-Hübner, Simone 9783642316791 Springer
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings

ISBN: 9783642316791 / Angielski / Miękka / 319 str.

ISBN: 9783642316791/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-H Bner; Matthew Wright
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 201...
cena: 202,66

Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers Charles Palmer, Sujeet Shenoi 9783642260407 Springer-Verlag Berlin and Heidelberg GmbH &
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

ISBN: 9783642260407 / Angielski / Miękka / 257 str.

ISBN: 9783642260407/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles Palmer;Sujeet Shenoi
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments,...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- ...
cena: 405,36

Transactions on Data Hiding and Multimedia Security VIII Yun Q. Shi 9783642319709 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security VIII

ISBN: 9783642319709 / Angielski / Miękka / 103 str.

ISBN: 9783642319709/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
cena: 202,66

Differential Cryptanalysis of the Data Encryption Standard Eli Biham Adi Shamir 9781461393160 Springer
Differential Cryptanalysis of the Data Encryption Standard

ISBN: 9781461393160 / Angielski / Miękka / 188 str.

ISBN: 9781461393160/Angielski/Miękka/188 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eli Biham; Adi Shamir
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many...
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national ...
cena: 425,64

Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings de Decker, Bart 9783642328046 Springer
Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings

ISBN: 9783642328046 / Angielski / Miękka / 239 str.

ISBN: 9783642328046/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart de Decker; David W. Chadwick
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications...
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 202,66

Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings Willem Jonker, Milan Petković 9783642328725 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings

ISBN: 9783642328725 / Angielski / Miękka / 177 str.

ISBN: 9783642328725/Angielski/Miękka/177 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker;Milan Petkovic
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 1...
cena: 186,49

Speech Dereverberation Patrick A. Naylor Nikolay D. Gaubitch 9781447125778 Springer
Speech Dereverberation

ISBN: 9781447125778 / Angielski / Miękka / 388 str.

ISBN: 9781447125778/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick A. Naylor; Nikolay D. Gaubitch

Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberation.

Speech Dereverberation presents current approaches to the problem of reverberation. It provides a review of topics in room acoustics and also describes performance measures for dereverberation. The algorithms are then explained with mathematical analysis and examples that enable the reader to see the strengths and weaknesses of the various techniques, as well as giving an understanding of the questions still to be addressed. Techniques...

Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberati...

cena: 608,07

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia