• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2777

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit Kim, Tai-hoon 9783642271885 Springer
Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit

ISBN: 9783642271885 / Angielski / Miękka / 252 str.

ISBN: 9783642271885/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tai-hoon Kim; Hojjat Adeli; Wai-Chi Fang
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology.
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Confe...
cena: 203,61

 Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re Prouff, Emmanuel 9783642272561 Springer
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re

ISBN: 9783642272561 / Angielski / Miękka / 335 str.

ISBN: 9783642272561/Angielski/Miękka/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emmanuel Prouff
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research...
cena: 203,61

 Crittografia Nel Paese Delle Meraviglie Venturi, Daniele 9788847024809 Springer
Crittografia Nel Paese Delle Meraviglie

ISBN: 9788847024809 / Włoski / Miękka / 500 str.

ISBN: 9788847024809/Włoski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniele Venturi

In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati. Oggi, l evoluzione dei sistemi digitali ha generato nuovi scenari di comunicazione, richiedendo ai moderni crittografi di progettare crittosistemi che soddisfino requisiti di sicurezza complessi, ben oltre il requisito base di confidenzialita ottenibile attraverso la scrittura nascosta .

Tuttavia, l analisi di sicurezza di questi schemi crittografici (fino ai primi anni 80)...

In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il conte...

cena: 183,25

 Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings Cuzzocrea, Alfredo 9783642235436 Springer-Verlag Berlin and Heidelberg GmbH &
Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings

ISBN: 9783642235436 / Angielski / Miękka / 498 str.

ISBN: 9783642235436/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011. The 37 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on physical and conceptual data warehouse models, data warehousing design methodologies and tools, data warehouse performance and optimization, pattern mining, matrix-based mining techniques and stream, sensor and time-series mining.
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in To...
cena: 203,61

 Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U Pointcheval, David 9783642290107 Springer
Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U

ISBN: 9783642290107 / Angielski / Miękka / 758 str.

ISBN: 9783642290107/Angielski/Miękka/758 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Pointcheval; Thomas Johansson
Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT...
cena: 203,61

 Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense Lopez, Javier 9783642289194 Springer
Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

ISBN: 9783642289194 / Angielski / Miękka / 357 str.

ISBN: 9783642289194/Angielski/Miękka/357 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Javier Lopez; Roberto Setola; Stephen Wolthusen
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one...
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critic...
cena: 346,16

 Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers Peeter Laud 9783642296147 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

ISBN: 9783642296147 / Angielski / Miękka / 273 str.

ISBN: 9783642296147/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peeter Laud
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
cena: 203,61

 Cyber Situational Awareness: Issues and Research Jajodia, Sushil 9781461424758 Springer, Berlin
Cyber Situational Awareness: Issues and Research

ISBN: 9781461424758 / Angielski / Miękka / 252 str.

ISBN: 9781461424758/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
cena: 407,25

 Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings Helleseth, Tor 9783642306143 Springer
Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings

ISBN: 9783642306143 / Angielski / Miękka / 337 str.

ISBN: 9783642306143/Angielski/Miękka/337 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tor Helleseth; Jonathan Jedwab
Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. This title includes papers that are grouped in topical sections on: perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; and, more.
Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. T...
cena: 203,61

 Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang 9783642309205 Springer-Verlag Berlin and Heidelberg GmbH &
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

ISBN: 9783642309205 / Angielski / Miękka / 341 str.

ISBN: 9783642309205/Angielski/Miękka/341 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Katzenbeisser;Edgar Weippl;L. Jean Camp
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in June 2012.
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in...
cena: 203,61

 Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings Susilo, Willy 9783642314476 Springer
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

ISBN: 9783642314476 / Angielski / Miękka / 460 str.

ISBN: 9783642314476/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Yi Mu; Jennifer Seberry
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...
cena: 203,61

 Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings Cuppens-Boulahia, Nora 9783642315398 Springer
Data and Applications Security and Privacy XXVI: 26th Annual Ifip Wg 11.3 Conference, Dbsec 2012, Paris, France, July 11-13, 2012, Proceedings

ISBN: 9783642315398 / Angielski / Miękka / 340 str.

ISBN: 9783642315398/Angielski/Miękka/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nora Cuppens-Boulahia; Frederic Cuppens; Joaquin Garcia-Alfaro
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012.The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
cena: 203,61

 Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello 9783642316678 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

ISBN: 9783642316678 / Angielski / Twarda / 294 str.

ISBN: 9783642316678/Angielski/Twarda/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Bruno Crispo;Simone Fischer-Hubner
Constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011.
Constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Tren...
cena: 203,61

 Mobile Authentication: Problems and Solutions Jakobsson, Markus 9781461448778 Springer
Mobile Authentication: Problems and Solutions

ISBN: 9781461448778 / Angielski / Miękka / 113 str.

ISBN: 9781461448778/Angielski/Miękka/113 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Jakobsson
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine...
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-mach...
cena: 203,61

 Security and Privacy in Communication Networks: 7th International Icst Conference, Securecomm 2011, London, September 7-9, 2011, Revised Selected Pape Rajarajan, Muttukrishnan 9783642319082 Springer
Security and Privacy in Communication Networks: 7th International Icst Conference, Securecomm 2011, London, September 7-9, 2011, Revised Selected Pape

ISBN: 9783642319082 / Angielski / Miękka / 548 str.

ISBN: 9783642319082/Angielski/Miękka/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Muttukrishnan Rajarajan; Fred Piper; Haining Wang
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2...
cena: 203,61

 Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers Kim, Howon 9783642319112 Springer
Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

ISBN: 9783642319112 / Angielski / Miękka / 512 str.

ISBN: 9783642319112/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Howon Kim
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and...
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held...
cena: 203,61

 Eco-Friendly Computing and Communication Systems: International Conference, Iceccs 2012, Kochi, India, August 9-11, 2012. Proceedings Mathew, Jimson 9783642321115 Springer
Eco-Friendly Computing and Communication Systems: International Conference, Iceccs 2012, Kochi, India, August 9-11, 2012. Proceedings

ISBN: 9783642321115 / Angielski / Miękka / 444 str.

ISBN: 9783642321115/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jimson Mathew; Priyadarshan Patra; D. K. Pradhan
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in topical sections on energy efficient software system and applications; wireless communication systems; green energy technologies; image and signal processing; bioinformatics and emerging technologies; secure and reliable systems; mathematical modeling and scientific computing; pervasive...
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in ...
cena: 203,61

 Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings Fischer-Hübner, Simone 9783642322860 Springer
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings

ISBN: 9783642322860 / Angielski / Miękka / 242 str.

ISBN: 9783642322860/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-H Bner; Sokratis Katsikas; Gerald Quirchmayr
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vi...
cena: 187,35

 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781461454151 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

ISBN: 9781461454151 / Angielski / Twarda / 204 str.

ISBN: 9781461454151/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; V. S. Subrahmanian

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 407,25

 Multidisciplinary Research and Practice for Informations Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross Domain Conference and Workshop on Availab Quirchmayer, Gerald 9783642324970 Springer
Multidisciplinary Research and Practice for Informations Systems: Ifip Wg 8.4, 8.9, Tc 5 International Cross Domain Conference and Workshop on Availab

ISBN: 9783642324970 / Angielski / Miękka / 683 str.

ISBN: 9783642324970/Angielski/Miękka/683 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerald Quirchmayer; Josef Basl; Ilsun You
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and...
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Relia...
cena: 407,25

Pierwsza Podprzednia  124  125  126  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia