• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Synchronizing E-Security Godfried Williams 9781402076466 Kluwer Academic Publishers
Synchronizing E-Security

ISBN: 9781402076466 / Angielski / Twarda / 96 str.

ISBN: 9781402076466/Angielski/Twarda/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Godfried Williams
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on...
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electro...
cena: 403,47 zł

 Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas Andrzej Piegat 9781402077760 Springer
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

ISBN: 9781402077760 / Angielski / Twarda / 396 str.

ISBN: 9781402077760/Angielski/Twarda/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Andrzej Piegat

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E...

cena: 806,99 zł

 The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology Urs E. Gattiker 9781402078897 Kluwer Academic Publishers
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology

ISBN: 9781402078897 / Angielski / Twarda / 411 str.

ISBN: 9781402078897/Angielski/Twarda/411 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Urs E. Gattiker
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
cena: 614,83 zł

 Data-Driven Block Ciphers for Fast Telecommunication Systems Nikolai Moldovyan Alexander A. Moldovyan Nick Moldovyan 9781420054118 Auerbach Publications
Data-Driven Block Ciphers for Fast Telecommunication Systems

ISBN: 9781420054118 / Angielski / Twarda / 208 str.

ISBN: 9781420054118/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikolai Moldovyan; Alexander A. Moldovyan; Nick Moldovyan
The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts....

The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and C...

cena: 632,81 zł

 Handbook of Financial Cryptography and Security Burton Rosenberg 9781420059816 Chapman & Hall/CRC
Handbook of Financial Cryptography and Security

ISBN: 9781420059816 / Angielski / Twarda / 631 str.

ISBN: 9781420059816/Angielski/Twarda/631 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Burton Rosenberg

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more.

In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/e-cash. It also looks at the role of cryptography in auctions and...

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es...

cena: 705,83 zł

 Cryptography in C and C++ Michael Welschenbach David Kramer 9781590595022 Apress
Cryptography in C and C++

ISBN: 9781590595022 / Angielski / Twarda / 504 str.

ISBN: 9781590595022/Angielski/Twarda/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Welschenbach; David Kramer
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what is more, none of these applications would work without cryptography The...
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to pres...
cena: 403,47 zł

 An Information Security Handbook John M. D. Hunter 9781852331801 Springer
An Information Security Handbook

ISBN: 9781852331801 / Angielski / Miękka / 226 str.

ISBN: 9781852331801/Angielski/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John M. D. Hunter
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in...
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Informatio...
cena: 201,72 zł

 Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings Deng, Robert H. 9783540001645 Springer
Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings

ISBN: 9783540001645 / Angielski / Miękka / 500 str.

ISBN: 9783540001645/Angielski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Deng; S. Qing; F. Bao
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97), Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve...
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c-...
cena: 201,72 zł

 Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown Zheng, Yuliang 9783540001713 Springer
Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown

ISBN: 9783540001713 / Angielski / Miękka / 582 str.

ISBN: 9783540001713/Angielski/Miękka/582 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuliang Zheng; Y. Zheng

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures,...

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Secu...

cena: 201,72 zł

 Progress in Cryptology - Indocrypt 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 Menezes, Alfred 9783540002635 Springer
Progress in Cryptology - Indocrypt 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002

ISBN: 9783540002635 / Angielski / Miękka / 444 str.

ISBN: 9783540002635/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A. Menezes; P. Sarkar
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spread across 21 countries and 4 continents, which goes a long way to demonstrate the international interest and visibility of INDOCRYPT.In the previous two conferences, the submissions from India originated from only two institutes; this increased to six for the 2002 conference.Thus INDOCRYPT is well...
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a for...
cena: 201,72 zł

 Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 13-15, 2002, Revised Papers Kaliski, Burton S. Jr. 9783540004097 Springer
Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 13-15, 2002, Revised Papers

ISBN: 9783540004097 / Angielski / Miękka / 618 str.

ISBN: 9783540004097/Angielski/Miękka/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin R. Prince; Burton S. Kaliski; C. K. Koc
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachusetts, and the third held in Europe, this is the ?rst Workshop on the West Coast of the United States. There was a record number of submissions this year and in response the technical program was extended to 3 days. As is evident by the papers in these proceedings, there have been again many excellent submissions. Selecting the papers for this year's CHES was not an easy task, and we regret that we could not accept many contributions due to the...
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachuse...
cena: 201,72 zł

 Information Hiding: 5th International Workshop, Ih 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002, Revised Papers Petitcolas, Fabien A. P. 9783540004219 Springer
Information Hiding: 5th International Workshop, Ih 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002, Revised Papers

ISBN: 9783540004219 / Angielski / Miękka / 430 str.

ISBN: 9783540004219/Angielski/Miękka/430 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karl A. P. Vind; Fabien A. P. Petitcolas; F. A. P. Ed Petitcolas
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA),...
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 Octob...
cena: 201,72 zł

 Privacy Enhancing Technologies: Second International Workshop, Pet 2002, San Francisco, Ca, Usa, April 14-15, 2002, Revised Papers Dingledine, Roger 9783540005650 Springer
Privacy Enhancing Technologies: Second International Workshop, Pet 2002, San Francisco, Ca, Usa, April 14-15, 2002, Revised Papers

ISBN: 9783540005650 / Angielski / Miękka / 242 str.

ISBN: 9783540005650/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel F. Rappaz; Roger Dingledine; Paul Syverson
The second Privacy Enhancing Technologies workshop (PET2002), held April 14-15, 2002 in San Francisco, California, continued the enthusiasm and quality of the ?rst workshop in July 2000 (then called "Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability," LNCS 2009). The workshop focused on the design and realization of anonymity and an- censorship services for the Internet and other communication networks. For c- venienceitwasheldattheCathedralHillHoteljustpriortotheTwelfthConf- ence on Computers, Freedom, and Privacy (CFP2002), but it was not formally...
The second Privacy Enhancing Technologies workshop (PET2002), held April 14-15, 2002 in San Francisco, California, continued the enthusiasm and qualit...
cena: 201,72 zł

 Public Key Cryptography -- Pkc 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Bao, Feng 9783540210184 Springer
Public Key Cryptography -- Pkc 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004

ISBN: 9783540210184 / Angielski / Miękka / 472 str.

ISBN: 9783540210184/Angielski/Miękka/472 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao; Robert Deng; Jianying Zhou

This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.

The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues in public key cryptography are addressed ranging from theoretical and mathematical foundations to a broad variety of public key cryptosystems.

This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held ...

cena: 201,72 zł

 Information Hiding: 6th International Workshop, Ih 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers Fridrich, Jessica 9783540242079 Springer
Information Hiding: 6th International Workshop, Ih 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers

ISBN: 9783540242079 / Angielski / Miękka / 388 str.

ISBN: 9783540242079/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessica Fridrich
It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 years, the field of data hiding has been maturing and expanding, gradually establishing its place as an active interdisciplinary research area uniquely combining information theory, cryptology, and signal processing. This year, the workshop was followed by the Privacy Enhancing Technologies workshop (PET) hosted at the same location. Delegates viewed this connection as fruitful as it gave both communities a convenient opportunity to interact. We...
It is an honor and great pleasure to write a preface for this postproceedings of the 6th International Workshop on Information Hiding. In the past 10 ...
cena: 201,72 zł

 Security Protocols: 11th International Workshop, Cambridge, Uk, April 2-4, 2003, Revised Selected Papers Christianson, Bruce 9783540283898 Springer
Security Protocols: 11th International Workshop, Cambridge, Uk, April 2-4, 2003, Revised Selected Papers

ISBN: 9783540283898 / Angielski / Miękka / 354 str.

ISBN: 9783540283898/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson; James A. Malcolm; Bruno Crispo
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was Where have all the Protocols gone? Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion, openupnewlinesofinvestigation, and...
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was Where have al...
cena: 201,72 zł

 Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Therani Madhusudan 9783540401896 Springer-Verlag Berlin and Heidelberg GmbH &
Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

ISBN: 9783540401896 / Angielski / Miękka / 390 str.

ISBN: 9783540401896/Angielski/Miękka/390 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen;Richard Miranda;Daniel D. Zeng
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement,...
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly...
cena: 201,72 zł

 Security Protocols: 12th International Workshop, Cambridge, Uk, April 26-28, 2004. Revised Selected Papers Christianson, Bruce 9783540409250 Springer
Security Protocols: 12th International Workshop, Cambridge, Uk, April 26-28, 2004. Revised Selected Papers

ISBN: 9783540409250 / Angielski / Miękka / 344 str.

ISBN: 9783540409250/Angielski/Miękka/344 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson; Bruno Crispo; James A. Malcolm
Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was Authentic Privacy. Traditionally we have based authentication upon a rather strong notion of identity, and have then built other security services on top of authentication. Perhaps if we want a more nuanced notion of privacy, then we need to re-examine some of our assu- tions, particularly when attackers and defenders share the same...
Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to t...
cena: 201,72 zł

 Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 9783540410317 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

ISBN: 9783540410317 / Angielski / Miękka / 330 str.

ISBN: 9783540410317/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frederic Cuppens;Yves Deswarte;Dieter Gollmann
his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in O...
cena: 201,72 zł

 Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings Tatsuaki Okamoto 9783540414049 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology - ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings

ISBN: 9783540414049 / Angielski / Miękka / 636 str.

ISBN: 9783540414049/Angielski/Miękka/636 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tatsuaki Okamoto
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptology and Security, ASIACRYPT 2000, held in Kyoto, Japan in December 2000. were carefully reviewed and selected from a total of 140 submissions. signatures, cryptographic protocols, number-theoretic algorithms, symmetric-key schemes, fingerprinting, zero-knowledge and provable security, Boolean functions, pseudorandomness, and public-key encryption and key distribution.
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptology and Security, ASIACRYPT...
cena: 201,72 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia