• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2950464]
• Literatura piękna
 [1818042]

  więcej...
• Turystyka
 [70123]
• Informatyka
 [151510]
• Komiksy
 [36386]
• Encyklopedie
 [23145]
• Dziecięca
 [612723]
• Hobby
 [135488]
• AudioBooki
 [1799]
• Literatura faktu
 [226050]
• Muzyka CD
 [373]
• Słowniki
 [2969]
• Inne
 [447626]
• Kalendarze
 [1159]
• Podręczniki
 [167118]
• Poradniki
 [469407]
• Religia
 [508205]
• Czasopisma
 [523]
• Sport
 [61168]
• Sztuka
 [242947]
• CD, DVD, Video
 [3513]
• Technologie
 [218724]
• Zdrowie
 [98968]
• Książkowe Klimaty
 [124]
• Zabawki
 [2556]
• Puzzle, gry
 [3690]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [8106]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2772

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cyber Defense and Situational Awareness Alexander Kott Cliff Wang Robert Erbacher 9783319113906 Springer
Cyber Defense and Situational Awareness

ISBN: 9783319113906 / Angielski / Twarda / 329 str.

ISBN: 9783319113906/Angielski/Twarda/329 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander Kott; Cliff Wang; Robert Erbacher
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
cena: 402,53

 Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings Bernsmed, Karin 9783319115986 Springer
Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings

ISBN: 9783319115986 / Angielski / Miękka / 296 str.

ISBN: 9783319115986/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karin Bernsmed; Simone Fischer-Hubner
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers ...
cena: 193,23

 Post-Quantum Cryptography: 6th International Workshop, Pqcrypto 2014, Waterloo, On, Canada, October 1-3, 2014. Proceedings Mosca, Michele 9783319116587 Springer
Post-Quantum Cryptography: 6th International Workshop, Pqcrypto 2014, Waterloo, On, Canada, October 1-3, 2014. Proceedings

ISBN: 9783319116587 / Angielski / Miękka / 284 str.

ISBN: 9783319116587/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michele Mosca
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Ca...
cena: 201,24

 Network and System Security: 8th International Conference, Nss 2014, Xi'an, China, October 15-17, 2014. Proceedings Au, Man Ho 9783319116976 Springer
Network and System Security: 8th International Conference, Nss 2014, Xi'an, China, October 15-17, 2014. Proceedings

ISBN: 9783319116976 / Angielski / Miękka / 576 str.

ISBN: 9783319116976/Angielski/Miękka/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Man Ho Ho; Barbara Carminati; C. -C Jay Kuo
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2...
cena: 201,24

 Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings Mauw, Sjouke 9783319118505 Springer
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings

ISBN: 9783319118505 / Angielski / Miękka / 210 str.

ISBN: 9783319118505/Angielski/Miękka/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sjouke Mauw; Christian Damsgaard Jensen
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland,...
cena: 193,23

 Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers Rainer Böhme, Michael Brenner, Tyler Moore, Matthew Smith 9783662447734 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers

ISBN: 9783662447734 / Angielski / Miękka / 249 str.

ISBN: 9783662447734/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rainer Bohme;Michael Brenner;Tyler Moore
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues;...
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN...
cena: 201,24

 Communications and Multimedia Security: 15th Ifip Tc 6/Tc 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings de Decker, Bart 9783662448847 Springer
Communications and Multimedia Security: 15th Ifip Tc 6/Tc 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings

ISBN: 9783662448847 / Angielski / Miękka / 157 str.

ISBN: 9783662448847/Angielski/Miękka/157 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart de Decker; Andre Zuquete
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 161,03

 Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers Gilbert Peterson, Sujeet Shenoi 9783662449516 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers

ISBN: 9783662449516 / Angielski / Twarda / 335 str.

ISBN: 9783662449516/Angielski/Twarda/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson;Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 201,24

 Integer Algorithms in Cryptology and Information Assurance Boris S. Verkhovsky 9789814623742 World Scientific Publishing Co Pte Ltd
Integer Algorithms in Cryptology and Information Assurance

ISBN: 9789814623742 / Angielski / Twarda / 460 str.

ISBN: 9789814623742/Angielski/Twarda/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Boris S. Verkhovsky
Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication. It concentrates on the “what” and “how” behind implementing the proposed cryptographic algorithms rather than on formal proofs of “why” these algorithms work.The book consists of five parts (in 28 chapters) and describes the author's research results in: This text contains innovative cryptographic algorithms; computationally efficient algorithms for...
Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocol...
cena: 705,83

 Securing Voip: Keeping Your Voip Network Safe (bud) Bates, Regis J. Jr. 9780124170391 SYNGRESS MEDIA
Securing Voip: Keeping Your Voip Network Safe

ISBN: 9780124170391 / Angielski / Miękka / 220 str.

ISBN: 9780124170391/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Regis J. (Bud) Bates

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans,...

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiti...

cena: 180,06

 Trusted Computing Platforms: Design and Applications Smith, Sean W. 9781489997739 Springer
Trusted Computing Platforms: Design and Applications

ISBN: 9781489997739 / Angielski / Miękka / 239 str.

ISBN: 9781489997739/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Smith

How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardware and software magic, these platforms attempt to solve this remote trust problem, to preserve various critical properties against various types of adversaries.

However, these current efforts are just points on a larger continuum, which ranges from earlier work on secure coprocessor design and...

How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In r...

cena: 402,53

 Beaglebone for Secret Agents Josh Datko   9781783986040 Packt Publishing
Beaglebone for Secret Agents

ISBN: 9781783986040 / Angielski / Miękka / 162 str.

ISBN: 9781783986040/Angielski/Miękka/162 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josh Datko
cena: 114,59

 Securing Wireless Communications at the Physical Layer Ruoheng Liu Wade Trappe  9781489983756 Springer
Securing Wireless Communications at the Physical Layer

ISBN: 9781489983756 / Angielski / Miękka / 396 str.

ISBN: 9781489983756/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ruoheng Liu;Wade Trappe
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is...
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to ...
cena: 603,81

 Information Security and Cryptology -- Icisc 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers Lee, Hyang-Sook 9783319121598 Springer
Information Security and Cryptology -- Icisc 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers

ISBN: 9783319121598 / Angielski / Miękka / 538 str.

ISBN: 9783319121598/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hyang-Sook Lee; Dong-Guk Han
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and...
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology,...
cena: 201,24

 Cryptology and Network Security: 13th International Conference, Cans 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings Gritzalis, Dimitris 9783319122793 Springer
Cryptology and Network Security: 13th International Conference, Cans 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

ISBN: 9783319122793 / Angielski / Miękka / 401 str.

ISBN: 9783319122793/Angielski/Miękka/401 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis; Aggelos Kiayias; Ioannis Askoxylakis
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, ...
cena: 201,24

 Provable Security: 8th International Conference, Provsec 2014, Hong Kong, China, October 9-10, 2014. Proceedings Chow, Sherman S. M. 9783319124742 Springer
Provable Security: 8th International Conference, Provsec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

ISBN: 9783319124742 / Angielski / Miękka / 351 str.

ISBN: 9783319124742/Angielski/Miękka/351 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sherman S. M. Chow; Joseph K. Liu; Lucas C. K. Hui
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in Sept...
cena: 201,24

 Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings Meier, Willi 9783319130385 Springer
Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings

ISBN: 9783319130385 / Angielski / Miękka / 444 str.

ISBN: 9783319130385/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willi Meier; Debdeep Mukhopadhyay
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, ...
cena: 201,24

 Selected Areas in Cryptography -- Sac 2014: 21st International Conference, Montreal, Qc, Canada, August 14-15, 2014, Revised Selected Papers Joux, Antoine 9783319130507 Springer
Selected Areas in Cryptography -- Sac 2014: 21st International Conference, Montreal, Qc, Canada, August 14-15, 2014, Revised Selected Papers

ISBN: 9783319130507 / Angielski / Miękka / 381 str.

ISBN: 9783319130507/Angielski/Miękka/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antoine Joux; Amr Youssef
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and...
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, ...
cena: 201,24

 Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 2014, Revised Selected Saxena, Nitesh 9783319130651 Springer
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 2014, Revised Selected

ISBN: 9783319130651 / Angielski / Miękka / 215 str.

ISBN: 9783319130651/Angielski/Miękka/215 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nitesh Saxena; Ahmad-Reza Sadeghi
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The ...
cena: 193,23

 Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers Nicolas Christin, Reihaneh Safavi-Naini 9783662454718 Springer-Verlag Berlin and Heidelberg GmbH &
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers

ISBN: 9783662454718 / Angielski / Miękka / 506 str.

ISBN: 9783662454718/Angielski/Miękka/506 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Christin;Reihaneh Safavi-Naini
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu...
cena: 201,24

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia