• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2736

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Digital Watermarking: 5th International Workshop, Iwdw 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings Shi, Yun Qing 9783540488255 Springer
Digital Watermarking: 5th International Workshop, Iwdw 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings

ISBN: 9783540488255 / Angielski / Miękka / 476 str.

ISBN: 9783540488255/Angielski/Miękka/476 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Qing Shi; Byeungwoo Jeon
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it has been a focal point for meeting in person and disseminating valuable scientific and technological developments in watermarking. IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was Meet the Challenges in this Digital World As we all know, digital watermarking and its related technologies have emerged as the key ingredients of this digital world. We report on new developments and discuss how to best utilize...
Welcome to the proceedings of the Fifth International Workshop on Digital Watermarking (IWDW). Since the first IWDW held in Seoul, Korea in 2002, it h...
cena: 201,72 zł

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9780387772677 SPRINGER-VERLAG NEW YORK INC.
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9780387772677 / Angielski / Twarda / 371 str.

ISBN: 9780387772677/Angielski/Twarda/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 605,23 zł

 Computer Security - Esorics 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings de Capitani Di Vimercati, Sabrina 9783540289630 Springer
Computer Security - Esorics 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings

ISBN: 9783540289630 / Angielski / Miękka / 516 str.

ISBN: 9783540289630/Angielski/Miękka/516 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Capitani Di Vimercati S. De; Sabrina de Capitani Di Vimercati
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12 14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm-...
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer...
cena: 201,72 zł

 Transactions on Data Hiding and Multimedia Security I Yun Q. Shi 9783540490715 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security I

ISBN: 9783540490715 / Angielski / Miękka / 139 str.

ISBN: 9783540490715/Angielski/Miękka/139 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,72 zł

 Mobile Ad-Hoc and Sensor Networks: Second International Conference, Msn 2006, Hong Kong, China, December 13-15, 2006, Proceedings Cao, Jiannong 9783540499329 Springer
Mobile Ad-Hoc and Sensor Networks: Second International Conference, Msn 2006, Hong Kong, China, December 13-15, 2006, Proceedings

ISBN: 9783540499329 / Angielski / Miękka / 892 str.

ISBN: 9783540499329/Angielski/Miękka/892 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jiannong Cao; Ivan Stojmenovic; Xiaohua Jia

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong Kong, China in December 2006. The 73 revised full papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, security, energy efficiency, data processing, and deployment.


This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2006, held in Hong ...

cena: 403,47 zł

 Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings Stajano, Frank 9783540732747 Springer
Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings

ISBN: 9783540732747 / Angielski / Miękka / 250 str.

ISBN: 9783540732747/Angielski/Miękka/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine Meadows
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We...
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd...
cena: 201,72 zł

 Pairing-Based Cryptography - Pairing 2007: First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings Takagi, Tsuyoshi 9783540734888 Springer
Pairing-Based Cryptography - Pairing 2007: First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings

ISBN: 9783540734888 / Angielski / Miękka / 410 str.

ISBN: 9783540734888/Angielski/Miękka/410 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tatsuaki Okamoto

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007. The 18 revised full papers presented together were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections including those on applications, and certificateless public key encryption.


Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, be...

cena: 201,72 zł

 Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro Hämmerli, Bernhard 9783540736134 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro

ISBN: 9783540736134 / Angielski / Miękka / 254 str.

ISBN: 9783540736134/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer
organized by Lexi Pimenidis of RWTH Aachen.
organized by Lexi Pimenidis of RWTH Aachen.
cena: 201,72 zł

 Encryption for Digital Content Aggelos Kiayias Serdar Pehlivanglu 9781441900432 Springer
Encryption for Digital Content

ISBN: 9781441900432 / Angielski / Twarda / 209 str.

ISBN: 9781441900432/Angielski/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Serdar Pehlivanglu

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth...

cena: 403,47 zł

 Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, Usa, March 18-20, 2009 Jarecki, Stanislaw 9783642004674 Springer
Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, Usa, March 18-20, 2009

ISBN: 9783642004674 / Angielski / Miękka / 526 str.

ISBN: 9783642004674/Angielski/Miękka/526 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stanislaw Jarecki
It has been a real pleasure to have taken part in organizing the 12th Inter- tional Conference on Practice and Theory in Public Key Cryptography (PKC 2009). PKC 2009 was held March 18-20, 2009, on the campus of the Univ- sity of California, Irvine (UCI). As usual, it was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with: - UCI Secure Computing and Networking Center (SCONCE) - UCI Donald Bren School of Information and Computer Sciences (DBSICS) - California Institute for Telecommunications and Information Technology (CalIT2) The PKC 2008 Program...
It has been a real pleasure to have taken part in organizing the 12th Inter- tional Conference on Practice and Theory in Public Key Cryptography (PKC ...
cena: 201,72 zł

 Topics in Cryptology - Ct-Rsa 2009: The Cryptographers' Track at the Rsa Conference 2009, San Francisco, Ca, Usa, April 20-24, 2009, Proceedings Fischlin, Marc 9783642008610 Springer
Topics in Cryptology - Ct-Rsa 2009: The Cryptographers' Track at the Rsa Conference 2009, San Francisco, Ca, Usa, April 20-24, 2009, Proceedings

ISBN: 9783642008610 / Angielski / Miękka / 482 str.

ISBN: 9783642008610/Angielski/Miękka/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Fischlin
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and...
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in...
cena: 201,72 zł

 Transactions on Data Hiding and Multimedia Security IV Yun Q. Shi 9783642017568 Springer
Transactions on Data Hiding and Multimedia Security IV

ISBN: 9783642017568 / Angielski / Miękka / 103 str.

ISBN: 9783642017568/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
This volume covers digital watermarking. It deals with robust watermarking, introduces a new least distortion linear gain model for halftone image watermarking, and presents an optimal histogram pair based image reversible data hiding scheme.
This volume covers digital watermarking. It deals with robust watermarking, introduces a new least distortion linear gain model for halftone image wat...
cena: 201,72 zł

 Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings Abdalla, Michel 9783642019562 Springer
Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

ISBN: 9783642019562 / Angielski / Miękka / 535 str.

ISBN: 9783642019562/Angielski/Miękka/535 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla
ACNS2009, the7thInternationalConferenceonAppliedCryptographyandN- work Security, was held in Paris-Rocquencourt, France, June 2-5, 2009. ACNS 2009 was organized by the Ecole Normale Sup erieure (ENS), the French - tional Center for Scienti?c Research (CNRS), and the French National Institute for Researchin Computer Science andControl(INRIA), in cooperationwith the InternationalAssociation for CryptologicResearch(IACR). The General Chairs of the conference were Pierre-Alain Fouque and Damien Vergnaud. Theconferencereceived150submissionsandeachsubmissionwasassignedto at least three committee...
ACNS2009, the7thInternationalConferenceonAppliedCryptographyandN- work Security, was held in Paris-Rocquencourt, France, June 2-5, 2009. ACNS 2009 was...
cena: 201,72 zł

 Group Theoretic Cryptography Maria Isabel Vasco Spyros Magliveras Rainer Steinwandt 9781584888369 Taylor & Francis
Group Theoretic Cryptography

ISBN: 9781584888369 / Angielski / Twarda / 244 str.

ISBN: 9781584888369/Angielski/Twarda/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria Isabel Vasco;Spyros Magliveras;Rainer Steinwandt

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future.
Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an...

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the l...

cena: 536,56 zł

 Coding and Cryptology: Second International Workshop, Iwcc 2009 Chee, Yeow Meng 9783642018138 Springer
Coding and Cryptology: Second International Workshop, Iwcc 2009

ISBN: 9783642018138 / Angielski / Miękka / 275 str.

ISBN: 9783642018138/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yeow Meng Chee
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian...
The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy...
cena: 201,72 zł

 Forensics in Telecommunications, Information and Multimedia: Second International Conference, E-Forensics 2009, Adelaide, Australia, January 19-21, 20 Sorell, Matthew 9783642023118 Springer
Forensics in Telecommunications, Information and Multimedia: Second International Conference, E-Forensics 2009, Adelaide, Australia, January 19-21, 20

ISBN: 9783642023118 / Angielski / Miękka / 224 str.

ISBN: 9783642023118/Angielski/Miękka/224 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew Sorell
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took place in Adelaide, South Australia during January 19-21, 2009, at the Australian National Wine Centre, University of Adelaide. In addition to the peer-reviewed academic papers presented in this volume, the c- ference featured a significant number of plenary contributions from recognized - tional and international leaders in digital forensic investigation. Keynote speaker Andy Jones, head of security research at British Telecom, outlined the...
The Second International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2009) took ...
cena: 201,72 zł

 Location Privacy Protection in Mobile Networks Xinxin Liu Xiaolin Li 9781461490739 Springer
Location Privacy Protection in Mobile Networks

ISBN: 9781461490739 / Angielski / Miękka / 75 str.

ISBN: 9781461490739/Angielski/Miękka/75 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xinxin Liu; Xiaolin Li
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users...
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes mu...
cena: 201,72 zł

 Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Yung, Moti 9783642014390 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

ISBN: 9783642014390 / Angielski / Miękka / 439 str.

ISBN: 9783642014390/Angielski/Miękka/439 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side...
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, ...
cena: 201,72 zł

 Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings Ian Goldberg, Mikhail Atallah 9783642031670 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings

ISBN: 9783642031670 / Angielski / Miękka / 255 str.

ISBN: 9783642031670/Angielski/Miękka/255 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ian Goldberg;Mikhail Atallah

This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009.

The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA...

cena: 201,72 zł

 Pairing-Based Cryptography - Pairing 2009: Third International Conference Palo Alto, Ca, Usa, August 12-14, 2009 Proceedings Shacham, Hovav 9783642032974 Springer
Pairing-Based Cryptography - Pairing 2009: Third International Conference Palo Alto, Ca, Usa, August 12-14, 2009 Proceedings

ISBN: 9783642032974 / Angielski / Miękka / 267 str.

ISBN: 9783642032974/Angielski/Miękka/267 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hovav Shacham
Pairing 2009, the Third International Conference on Pairing-Based Cryptog- phy, was held at Stanford University in Palo Alto during August 12-14, 2009. The conference was sponsored by Voltage Security and Microsoft Corporation. TerenceSpiesservedasGeneralChairoftheConferenceandwehadtheprivilege of serving as Program Co-chairs. Theconferencereceived38submissions.Thesewerereviewedby a committee of23members.Thecommitteehadathree-weekindividualreviewphasefollowed by three weeks of discussion. After careful deliberation, the committee chose 16 papers for the Pairing 2009 conference. Detailed...
Pairing 2009, the Third International Conference on Pairing-Based Cryptog- phy, was held at Stanford University in Palo Alto during August 12-14, 2009...
cena: 201,72 zł

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia