• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2777

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptology and Network Security: 4th International Conference, Cans 2005, Xiamen, China, December 14-16, 2005, Proceedings Desmedt, Yvo G. 9783540308492 Springer
Cryptology and Network Security: 4th International Conference, Cans 2005, Xiamen, China, December 14-16, 2005, Proceedings

ISBN: 9783540308492 / Angielski / Miękka / 352 str.

ISBN: 9783540308492/Angielski/Miękka/352 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Y. G. Desmedt; Yvo G. Desmedt; Huaxiong Wang
Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management.
Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, intrusion detection a...
cena: 203,61

 Secure Multi-Party Non-Repudiation Protocols and Applications Jos?? A. Onieva Javier Lopez Jianying Zhou 9780387756295 Not Avail
Secure Multi-Party Non-Repudiation Protocols and Applications

ISBN: 9780387756295 / Angielski / Twarda / 190 str.

ISBN: 9780387756295/Angielski/Twarda/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose A. Onieva; Javier Lopez; Jianying Zhou

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level...

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio...

cena: 407,25

 Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings Klaus Julisch, Christopher Kruegel 9783540266136 Springer-Verlag Berlin and Heidelberg GmbH &
Detection of Intrusions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings

ISBN: 9783540266136 / Angielski / Miękka / 241 str.

ISBN: 9783540266136/Angielski/Miękka/241 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Klaus Julisch;Christopher Kruegel
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security -- Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) as an annual conference that brings together experts from throughout the world to discuss the state of the art in the areas of intrusion detection, detection of malware, and assessment of vulnerabilities....
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions...
cena: 203,61

 Public Key Cryptography - Pkc 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, Fl, Usa, January 6-8, 2003, P Desmedt, Yvo 9783540003243 Springer
Public Key Cryptography - Pkc 2003: 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, Fl, Usa, January 6-8, 2003, P

ISBN: 9783540003243 / Angielski / Miękka / 376 str.

ISBN: 9783540003243/Angielski/Miękka/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yvo Desmedt
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was...
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciati...
cena: 203,61

 Stacs 98: 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings Morvan, Michel 9783540642305 Springer
Stacs 98: 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings

ISBN: 9783540642305 / Angielski / Miękka / 636 str.

ISBN: 9783540642305/Angielski/Miękka/636 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Morvan; Christoph Meinel; Daniel Krob
This book constitutes the strictly refereed proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, STACS 98, held in Paris, France, in February 1998.
The volume presents three invited surveys together with 52 revised full papers selected from a total of 155 submissions. The papers are organized in topical sections on algorithms and data structures, logic, complexity, and automata and formal languages.
This book constitutes the strictly refereed proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, STACS 98, held in Par...
cena: 407,25

 Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005,  Vladimir Gorodetsky, Igor Kotenko, Victor Skormin 9783540291138 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005,

ISBN: 9783540291138 / Angielski / Miękka / 482 str.

ISBN: 9783540291138/Angielski/Miękka/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vladimir Gorodetsky;Igor Kotenko;Victor Skormin
Constitutes the proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005. The papers in this book include topics on mathematical models, architectures and protocols for computer network security, and authentication, authorization and access control.
Constitutes the proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005...
cena: 203,61

 Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Feng, Dengguo 9783540308553 Springer
Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

ISBN: 9783540308553 / Angielski / Miękka / 428 str.

ISBN: 9783540308553/Angielski/Miękka/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
D. Feng; Dengguo Feng
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered...
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of th...
cena: 203,61

 Communications and Multimedia Security: 9th Ifip Tc-6 Tc-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings Dittmann, Jana 9783540287919 Springer
Communications and Multimedia Security: 9th Ifip Tc-6 Tc-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

ISBN: 9783540287919 / Angielski / Miękka / 360 str.

ISBN: 9783540287919/Angielski/Miękka/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J. Dittmann; Jana Dittmann; Stefan Katzenbeisser
It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19 21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28...
It is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which ...
cena: 203,61

 Digital Rights Management: Technologies, Issues, Challenges and Systems Safavi-Naini, Reihaneh 9783540359982 Springer
Digital Rights Management: Technologies, Issues, Challenges and Systems

ISBN: 9783540359982 / Angielski / Miękka / 360 str.

ISBN: 9783540359982/Angielski/Miękka/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reihaneh Safavi-Naini; Moti Yung
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS pronounced dramatics ), took place in Sydney, Australia on 31st October - 2nd November, 2005. It was or- nized by the Centre for Information Security of the University of Wollongong and in cooperation with the International Association of Cryptologic Research (IACR) and IEEE Computer Society s Task Force on Information Assurance. DRMTICS isan internationalconferenceseriesthat coversthe areaof digital rights management, including research advancements of an applied and theor-...
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS pronounced dramatics ), took plac...
cena: 203,61

 Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20 Karabulut, Yücel 9780387094274 Springer
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20

ISBN: 9780387094274 / Angielski / Twarda / 372 str.

ISBN: 9780387094274/Angielski/Twarda/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yucel Karabulut; John C. Mitchell; Peter Herrmann
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
cena: 407,25

 Advances in Ad Hoc Networking: Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 Cuenca, Pedro 9780387094892 Springer
Advances in Ad Hoc Networking: Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008

ISBN: 9780387094892 / Angielski / Twarda / 238 str.

ISBN: 9780387094892/Angielski/Twarda/238 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pedro Cuenca; Carlos Guerrero; Ramon Puigjaner
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research...
This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llle...
cena: 407,25

 Cryptographic Engineering Cetin Kaya Koc 9780387718163 Springer
Cryptographic Engineering

ISBN: 9780387718163 / Angielski / Twarda / 522 str.

ISBN: 9780387718163/Angielski/Twarda/522 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin Kaya Koc

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments....

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and...

cena: 1018,20

 Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, Uk, September 1-3, 2008, Proceedings Galbraith, Steven 9783540855033 Springer
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, Uk, September 1-3, 2008, Proceedings

ISBN: 9783540855033 / Angielski / Miękka / 394 str.

ISBN: 9783540855033/Angielski/Miękka/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Galbraith
The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing in Cryptography workshop (held in Dublin, Ireland on June 12-15, 2005) and the Pairing 2007 conference (held in Tokyo, Japan on July 2-4, 2007, with proce- ings published in Springer's LNCS 4575). The aim of this series of conferences is to bring together leading researchers and practitioners from academia and industry, all concerned with problems related to pairing-based cryptography. The programme consisted of 3 invited talks and 20...
The Pairing 2008 Conference was held at Royal Holloway, University of London during September 1-3, 2008. This conference followed on from the Pairing ...
cena: 203,61

 Algebraic Cryptanalysis Gregory V. Bard 9780387887562 Springer
Algebraic Cryptanalysis

ISBN: 9780387887562 / Angielski / Twarda / 356 str.

ISBN: 9780387887562/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory V. Bard

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois.

Topics include:

Analytic Combinatorics, and its application to cryptanalysis

The...

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided...

cena: 1018,20

 Smart Card Research and Advanced Applications: 7th Ifip Wg 8.8/11.2 International Conference, Cardis 2006, Tarragona, Spain, April 19-21, 2006, Procee Domingo-Ferrer, Josep 9783540333111 Springer
Smart Card Research and Advanced Applications: 7th Ifip Wg 8.8/11.2 International Conference, Cardis 2006, Tarragona, Spain, April 19-21, 2006, Procee

ISBN: 9783540333111 / Angielski / Miękka / 360 str.

ISBN: 9783540333111/Angielski/Miękka/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josep Domingo-Ferrer
Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear sc- tered and only loosely connected. Smart card research unites them by providing a common goal: advancing the state of the art of designing and deploying small tokens to increase the security in Information Technology. CARDIS has a tradition of more than one decade, and has established itself asthepremier conferencefor researchresultsinsmartcardtechnology.As smart card research is unique, so is CARDIS; the conference successfully attracts a-...
Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT Security, which often appear ...
cena: 203,61

 Auto-Identification and Ubiquitous Computing Applications Symonds, Judith 9781605662985 Information Science Publishing
Auto-Identification and Ubiquitous Computing Applications

ISBN: 9781605662985 / Angielski / Twarda / 350 str.

ISBN: 9781605662985/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Judith Symonds; John Ayoade; Dave Parry
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identific...
cena: 1005,14

 Protecting Privacy in Video Surveillance Andrew Senior 9781848823006 Springer London Ltd
Protecting Privacy in Video Surveillance

ISBN: 9781848823006 / Angielski / Miękka / 208 str.

ISBN: 9781848823006/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Senior

Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective.

A comprehensive introduction carefully guides the reader through the collection of cutting-edge research and current thinking. The technical elements of the field feature topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy...

Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging...

cena: 203,61

 Algebraic Geometry in Coding Theory and Cryptography Harald Niederreiter 9780691102887 Princeton University Press
Algebraic Geometry in Coding Theory and Cryptography

ISBN: 9780691102887 / Angielski / Twarda / 272 str.

ISBN: 9780691102887/Angielski/Twarda/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harald Niederreiter

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like...

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to informat...

cena: 336,44

 Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 18th International Symposium, Aaecc-18, Tarragona, Sapin, June 8-12, 2009, Proceedin Bras-Amorós, Maria 9783642021800 Springer
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 18th International Symposium, Aaecc-18, Tarragona, Sapin, June 8-12, 2009, Proceedin

ISBN: 9783642021800 / Angielski / Miękka / 243 str.

ISBN: 9783642021800/Angielski/Miękka/243 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria Bras-Amora3s
The AAECC symposia serieswas started in 1983by Alain Poli (Toulouse), who, together with R. Desq, D. Lazardand P. Camion, organizedthe ?rst conference. OriginallytheacronymAAECCstoodfor"AppliedAlgebraandError-Correcting Codes."Overtheyearsitsmeaninghasshiftedto"AppliedAlgebra, Algebraic- gorithmsandError-CorrectingCodes,"re?ectingthegrowingimportanceofc- plexity, particularlyfor decoding algorithms.During the AAECC-12 symposium the ConferenceCommitteedecidedtoenforcethe theoryandpracticeofthe c- ing side as well as the cryptographic aspects. Algebra was conserved, as in the past, but slightly...
The AAECC symposia serieswas started in 1983by Alain Poli (Toulouse), who, together with R. Desq, D. Lazardand P. Camion, organizedthe ?rst conference...
cena: 203,61

 Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings Park 9783642026164 Springer
Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings

ISBN: 9783642026164 / Angielski / Miękka / 876 str.

ISBN: 9783642026164/Angielski/Miękka/876 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jong Hyuk Park
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs,...
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 200...
cena: 407,25

Pierwsza Podprzednia  121  122  123  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia