• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2950464]
• Literatura piękna
 [1818042]

  więcej...
• Turystyka
 [70123]
• Informatyka
 [151510]
• Komiksy
 [36386]
• Encyklopedie
 [23145]
• Dziecięca
 [612723]
• Hobby
 [135488]
• AudioBooki
 [1799]
• Literatura faktu
 [226050]
• Muzyka CD
 [373]
• Słowniki
 [2969]
• Inne
 [447626]
• Kalendarze
 [1159]
• Podręczniki
 [167118]
• Poradniki
 [469407]
• Religia
 [508205]
• Czasopisma
 [523]
• Sport
 [61168]
• Sztuka
 [242947]
• CD, DVD, Video
 [3513]
• Technologie
 [218724]
• Zdrowie
 [98968]
• Książkowe Klimaty
 [124]
• Zabawki
 [2556]
• Puzzle, gry
 [3690]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [8106]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2774

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung München, 30. und 31. Oktober 1985 Proceedings Peter P. Spies 9783540160366 Springer-Verlag Berlin and Heidelberg GmbH &
Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung München, 30. und 31. Oktober 1985 Proceedings

ISBN: 9783540160366 / Niemiecki / Miękka / 256 str.

ISBN: 9783540160366/Niemiecki/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter P. Spies
Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im...
Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datensch...
cena: 206,88

 VIS ’91 Verläßliche Informationssysteme: GI-Fachtagung, Darmstadt, 13.–15. März 1991 Proceedings Andreas Pfitzmann, Eckart Raubold 9783540539117 Springer-Verlag Berlin and Heidelberg GmbH &
VIS ’91 Verläßliche Informationssysteme: GI-Fachtagung, Darmstadt, 13.–15. März 1991 Proceedings

ISBN: 9783540539117 / Niemiecki / Miękka / 355 str.

ISBN: 9783540539117/Niemiecki/Miękka/355 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Pfitzmann;Eckart Raubold
Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage stellungen im Schwerpunkt der Diskussion zu diesem Thema. Die neugegrOndete Fachgruppe "VerlaBliche Informationssysteme" (2.5.3) der GI wahlt als Ausgangspunkt ihrer Betrachtungen naturgemaB die systemtechnischen Gestaltungsmoglichkeiten von Informationssystemen, und von den vielen moglichen Zielen der Systemgestaltung hat die Fachgruppe die "VerlaBlichkeit" des Systems in den Mittelpunkt gestellt. Mit dem Begriff der VerlaBlichkeit verbindet die...
Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage st...
cena: 206,88

 Advances in Cryptology -- Crypto '92: 12th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 16-20, 1992. Proceedings Brickell, Ernest F. 9783540573401 Not Avail
Advances in Cryptology -- Crypto '92: 12th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 16-20, 1992. Proceedings

ISBN: 9783540573401 / Angielski / Miękka / 593 str.

ISBN: 9783540573401/Angielski/Miękka/593 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ernest F. Brickell
Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the University of California, Santa Barbara. Once again, it was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy. The conference ran smoothly, due to the diligent efforts of the g- eral chair, Spyros Magliveras of the University of Nebraska. One of the measures of the success of this series of conferences is represented by the ever increasing...
Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the Univ...
cena: 201,24

 Advances in Cryptology - Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceeding Helleseth, Tor 9783540576006 Springer
Advances in Cryptology - Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceeding

ISBN: 9783540576006 / Angielski / Twarda / 465 str.

ISBN: 9783540576006/Angielski/Twarda/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tor Helleseth
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret...
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every yea...
cena: 201,24

 Advances in Cryptology -- Crypto '93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings Stinson, Douglas R. 9783540577669 Not Avail
Advances in Cryptology -- Crypto '93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings

ISBN: 9783540577669 / Angielski / Miękka / 491 str.

ISBN: 9783540577669/Angielski/Miękka/491 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas R. Stinson
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months...
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of N...
cena: 201,24

 Advances in Cryptology -- Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 21-25, 1994. Proceedings Desmedt, Yvo G. 9783540583332 Not Avail
Advances in Cryptology -- Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 21-25, 1994. Proceedings

ISBN: 9783540583332 / Angielski / Miękka / 438 str.

ISBN: 9783540583332/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yvo G. Desmedt
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered...
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Societ...
cena: 201,24

 Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings Ishai, Yuval 9783642195709 Not Avail
Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings

ISBN: 9783642195709 / Angielski / Miękka / 631 str.

ISBN: 9783642195709/Angielski/Miękka/631 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuval Ishai
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA. This book includes 35 full papers together with 2 invited talks.
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA...
cena: 402,53

 Selected Areas in Cryptography: 17th International Workshop, Sac 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers Biryukov, Alex 9783642195730 Not Avail
Selected Areas in Cryptography: 17th International Workshop, Sac 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers

ISBN: 9783642195730 / Angielski / Miękka / 411 str.

ISBN: 9783642195730/Angielski/Miękka/411 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alex Biryukov; Guang Gong; Douglas R. Stinson
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, ...
cena: 201,24

 Information and Automation: International Symposium, ISIA 2010 Guangzhou, China, November 10-11, 2010 Revised Selected Papers Qi, Luo 9783642198526 Not Avail
Information and Automation: International Symposium, ISIA 2010 Guangzhou, China, November 10-11, 2010 Revised Selected Papers

ISBN: 9783642198526 / Angielski / Miękka / 780 str.

ISBN: 9783642198526/Angielski/Miękka/780 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luo Qi
This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in November 2010. The 110 revised full papers presented were carefully reviewed and selected from numerous submissions. The symposium provides a forum for researchers, educators, engineers, and government officials to present and discuss their latest research results and exchange views on the future research directions in the general areas of Information and Automation.
This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in N...
cena: 402,53

 Kryptologie: Methoden Und Maximen Bauer, Friedrich L. 9783540577713 Springer
Kryptologie: Methoden Und Maximen

ISBN: 9783540577713 / Niemiecki / Miękka / 369 str.

ISBN: 9783540577713/Niemiecki/Miękka/369 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Friedrich L. Bauer
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt fur den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken und Telekommunikation. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("offentliche Schlussel") treten interne Anwendungen, die sich auch auf Zugriffsberechtigungen und den Quellenschutz von Software erstrecken.
Der erste Teil des Buches handelt in elf Kapiteln von den Geheimschriften und ihrem Gebrauch - von der Kryptographie. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum unbefugten Entziffern...
Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt fur den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken...
cena: 206,88

 Mobile Agents and Security Giovanni Vigna 9783540647928 Springer
Mobile Agents and Security

ISBN: 9783540647928 / Angielski / Miękka / 272 str.

ISBN: 9783540647928/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Giovanni Vigna
New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents....
New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected"...
cena: 201,24

 Information Hiding: Second International Workshop, Ih'98, Portland, Oregon, Usa, April 14-17, 1998, Proceedings Aucsmith, David 9783540653868 Springer
Information Hiding: Second International Workshop, Ih'98, Portland, Oregon, Usa, April 14-17, 1998, Proceedings

ISBN: 9783540653868 / Angielski / Miękka / 369 str.

ISBN: 9783540653868/Angielski/Miękka/369 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Aucsmith; D. Aucsmith; J. Hartmanis
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in 'stray'...
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encrypt...
cena: 263,36

 Terrestrial Trunked Radio - Tetra: A Global Security Tool Stavroulakis, Peter 9783642090295 Not Avail
Terrestrial Trunked Radio - Tetra: A Global Security Tool

ISBN: 9783642090295 / Angielski / Miękka / 302 str.

ISBN: 9783642090295/Angielski/Miękka/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Stavroulakis

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative...

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased se...

cena: 603,81

 Advances in Cryptology -- Asiacrypt'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, Kazuo L. Ohta Ting-I Pei K. Ohta 9783540651093 Springer
Advances in Cryptology -- Asiacrypt'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China,

ISBN: 9783540651093 / Angielski / Miękka / 436 str.

ISBN: 9783540651093/Angielski/Miękka/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kazuo L. Ohta; Ting-I Pei; K. Ohta
ASIACRYPT 98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT 98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118...
ASIACRYPT 98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Bei...
cena: 201,24

 Visual Cryptography and Secret Image Sharing Stelvio Cimato Ching-Nung Yang 9781439837214 CRC Press
Visual Cryptography and Secret Image Sharing

ISBN: 9781439837214 / Angielski / Twarda / 546 str.

ISBN: 9781439837214/Angielski/Twarda/546 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stelvio Cimato; Ching-Nung Yang

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for...

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Cons...

cena: 1070,92

 Algebraic Aspects of the Advanced Encryption Standard Carlos Cid Sean Murphy Matthew Robshaw 9781441937292 Springer
Algebraic Aspects of the Advanced Encryption Standard

ISBN: 9781441937292 / Angielski / Miękka / 148 str.

ISBN: 9781441937292/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carlos Cid; Sean Murphy; Matthew Robshaw
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work...
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent R...
cena: 422,66

 Cryptographics: Exploiting Graphics Cards for Security Cook, Debra 9781441939647 Springer
Cryptographics: Exploiting Graphics Cards for Security

ISBN: 9781441939647 / Angielski / Miękka / 140 str.

ISBN: 9781441939647/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debra Cook; Angelos Keromytis

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs...

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult...

cena: 402,53

 Network Security Policies and Procedures Douglas W. Frye 9781441940476 Not Avail
Network Security Policies and Procedures

ISBN: 9781441940476 / Angielski / Miękka / 244 str.

ISBN: 9781441940476/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas W. Frye

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will...

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P...

cena: 563,56

 Multivariate Public Key Cryptosystems Jintai Ding Jason E. Gower Dieter S. Schmidt 9781441940773 Not Avail
Multivariate Public Key Cryptosystems

ISBN: 9781441940773 / Angielski / Miękka / 260 str.

ISBN: 9781441940773/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jintai Ding; Jason E. Gower; Dieter S. Schmidt

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both...

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly be...

cena: 483,04

 Malware Detection Mihai Christodorescu Somesh Jha Douglas Maughan 9781441940957 Not Avail
Malware Detection

ISBN: 9781441940957 / Angielski / Miękka / 312 str.

ISBN: 9781441940957/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mihai Christodorescu; Somesh Jha; Douglas Maughan

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have...

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi...

cena: 1207,67

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia