• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms Simone Fischer-Hübner 9783540421429 Springer-Verlag Berlin and Heidelberg GmbH &
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

ISBN: 9783540421429 / Angielski / Miękka / 358 str.

ISBN: 9783540421429/Angielski/Miękka/358 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.
Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the...
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Bes...
cena: 201,72 zł

 Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers Christianson, Bruce 9783540425663 Springer
Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers

ISBN: 9783540425663 / Angielski / Miękka / 264 str.

ISBN: 9783540425663/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Christianson; B. Criso; M. Roe
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished...
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of se...
cena: 201,72 zł

 Recent Advances in Intrusion Detection: 4th International Symposium, Raid 2001 Davis, Ca, Usa, October 10-12, 2001 Proceedings Lee, Wenke 9783540427025 Springer
Recent Advances in Intrusion Detection: 4th International Symposium, Raid 2001 Davis, Ca, Usa, October 10-12, 2001 Proceedings

ISBN: 9783540427025 / Angielski / Miękka / 210 str.

ISBN: 9783540427025/Angielski/Miękka/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Lee; L. Me; A. Wespi
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium. The RAID 2001program committee received 55 paper submissions from 13 countries. All submissions were carefully reviewed by several members of the program committee on the criteria of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held on May 16-17 in Oakland, California. Twelve papers were selected for presentation and pub- cation in the conference proceedings. In addition, nine...
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposiu...
cena: 201,72 zł

 Selected Areas in Cryptography: 6th Annual International Workshop, Sac'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings Heys, Howard 9783540671855 Springer
Selected Areas in Cryptography: 6th Annual International Workshop, Sac'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings

ISBN: 9783540671855 / Angielski / Miękka / 241 str.

ISBN: 9783540671855/Angielski/Miękka/241 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
H. Heys; C. Adams; Howard Heys
SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet...
SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa ...
cena: 201,72 zł

 Security in Communication Networks: Third International Conference, Scn 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers Cimato, Stelvio 9783540004202 Springer
Security in Communication Networks: Third International Conference, Scn 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers

ISBN: 9783540004202 / Angielski / Miękka / 263 str.

ISBN: 9783540004202/Angielski/Miękka/263 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin R. Prince; Stelvio Cimato; C. Galdi
The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amal?, Italy, September 11-13, 2002. The conference takes place every three years (p- vious ones were held in 1996 and 1999 in Amal? too) and aims to bring together researchers in the ?eld of security in communication networks to foster coop- ation and the exchange of ideas. The main topics included all technical aspects of data security including: anonymity implementation, authentication, key distribution, block ciphers, - erating systems security,...
The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amal?, ...
cena: 201,72 zł

 Advances in Cryptology - Crypto '86: Proceedings Odlyzko, Andrew M. 9783540180470 Springer
Advances in Cryptology - Crypto '86: Proceedings

ISBN: 9783540180470 / Angielski / Miękka / 490 str.

ISBN: 9783540180470/Angielski/Miękka/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew M. Odlyzko
This volume contains the proceedings of CRYPTO 86, one in a series of annual conferences at the University of California at Santa Barbara devoted to cryptologic research. The papers are presented in seven sections containing most of the presentations in the regular program, and a final section based on some informal presentations at a "Rump Session." The volume presents a very comprehensive picture of the latest public research in cryptography. Together with the proceedings of the previous Crypto and Eurocrypt meetings, it forms a set of indispensable reference works in this area. Of...
This volume contains the proceedings of CRYPTO 86, one in a series of annual conferences at the University of California at Santa Barbara devoted to c...
cena: 189,61 zł

 Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings Petra Perner, Dieter Gollmann, Jianying Zhou 9783540201502 Springer-Verlag Berlin and Heidelberg GmbH &
Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

ISBN: 9783540201502 / Angielski / Miękka / 418 str.

ISBN: 9783540201502/Angielski/Miękka/418 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Petra Perner;Dieter Gollmann;Jianying Zhou
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10-13 October 2003. Among the preceding conferences, ICICS'97 was held in B- jing, China, ICICS'99 in Sydney, Australia, ICICS 2001 in Xi'an, China, and ICICS 2002, in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference...
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10-13 Oct...
cena: 201,72 zł

 Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics Neuenschwander, Daniel 9783540220015 Springer
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics

ISBN: 9783540220015 / Angielski / Miękka / 162 str.

ISBN: 9783540220015/Angielski/Miękka/162 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Neuenschwander; D. Neuenshwander

Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of stochastic aspects of cryptology.

Besides classical topics from cryptology, the author presents chapters on probabilistic prime number tests, factorization with quantum computers, random-number generators, pseudo-random-number generators, information theory, and the birthday paradox and meet-in-the-middle attack.

In the light of the vast literature on stochastic results relevant for...

Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathemati...

cena: 201,56 zł

 Information and Communications Security: Third International Conference, Icics 2001, Xian, China, November 13-16, 2001. Proceedings Okamoto, Tatsuaki 9783540428800 Springer
Information and Communications Security: Third International Conference, Icics 2001, Xian, China, November 13-16, 2001. Proceedings

ISBN: 9783540428800 / Angielski / Miękka / 510 str.

ISBN: 9783540428800/Angielski/Miękka/510 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Qing; T. Okamoto; J. Zhou
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi an, China, 13-16 November 2001. Among the preceding conferences, ICICS 97 was held in Beijing, China, 11-14 November 1997 and ICICS 99 in Sydney, Australia, 9-11 November 1999. The ICICS 97 and ICICS 99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was...
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi an, China, 13-16 November 2001. Among the pr...
cena: 201,72 zł

 Cryptography and Coding: 8th Ima International Conference Cirencester, Uk, December 17-19, 2001 Proceedings Honary, Bahram 9783540430261 Springer
Cryptography and Coding: 8th Ima International Conference Cirencester, Uk, December 17-19, 2001 Proceedings

ISBN: 9783540430261 / Angielski / Miękka / 419 str.

ISBN: 9783540430261/Angielski/Miękka/419 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Honary; Bahram Honary
The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of Cryptography and Coding was both timely and relevant. The theme of this conference was the future of coding and cryptography,...
The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, ...
cena: 201,72 zł

 Inference Control in Statistical Databases: From Theory to Practice Josep Domingo-Ferrer 9783540436140 Springer-Verlag Berlin and Heidelberg GmbH &
Inference Control in Statistical Databases: From Theory to Practice

ISBN: 9783540436140 / Angielski / Miękka / 231 str.

ISBN: 9783540436140/Angielski/Miękka/231 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josep Domingo-Ferrer
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source of data for producing statistics. Techniques used by intruders to make inferences compromising privacy increasingly draw on data mining, record linkage, knowledge discovery, and data analysis and thus statistical inference control becomes an integral part of...
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs...
cena: 201,72 zł

 Security and Privacy in Digital Rights Management: ACM Ccs-8 Workshop Drm 2001, Philadelphia, Pa, Usa, November 5, 2001. Revised Papers Sander, Tomas 9783540436775 Springer
Security and Privacy in Digital Rights Management: ACM Ccs-8 Workshop Drm 2001, Philadelphia, Pa, Usa, November 5, 2001. Revised Papers

ISBN: 9783540436775 / Angielski / Miękka / 250 str.

ISBN: 9783540436775/Angielski/Miękka/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
T. Sander; Tomas Sander
Forming the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001, these 14 revised, full papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects.
Forming the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held du...
cena: 201,72 zł

 Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers Christianson, Bruce 9783540442639 Springer
Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers

ISBN: 9783540442639 / Angielski / Miękka / 246 str.

ISBN: 9783540442639/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Chrisianson; B. Cirspo; Bruce Christianson
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was "mobile computing versus immobile security." As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our...
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This ...
cena: 201,72 zł

 Digital Signature Schemes Pfitzmann, Birgit 9783540615170 Springer
Digital Signature Schemes

ISBN: 9783540615170 / Angielski / Miękka / 404 str.

ISBN: 9783540615170/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Birgit Pfitzmann;Pfitzmann
This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundations-of-informatics track.
Securing integrity for digital communications in the age of global electronic information exchange and electronic commerce is vital to democratic societies and a central technical challenge for cryptologists. As core contribution to advancing the state of the art, the author develops the new class of digital fail-stop signatures. This monograph is self-contained regarding the historical background and cryptographic...
This book, based on the author's Ph.D. thesis, was selected during the 1995 GI Doctoral Dissertation Competition as the winning thesis in the foundati...
cena: 201,72 zł

 Information Hiding: Third International Workshop, Ih'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings Pfitzmann, Andreas 9783540671824 Springer
Information Hiding: Third International Workshop, Ih'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

ISBN: 9783540671824 / Angielski / Miękka / 492 str.

ISBN: 9783540671824/Angielski/Miękka/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A. Pfitzmann; Andreas Pfitzmann
These are the refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in September/October 1999. The 33 revised full papers presented were reviewed and selected from a total of 68 submissions.
These are the refereed post-workshop proceedings of the Third International Workshop on Information Hiding, IH'99, held in Dresden, Germany, in Septem...
cena: 403,47 zł

 Information Security and Privacy: 5th Australasian Conference, Acisp 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Dawson, Ed 9783540677420 Springer
Information Security and Privacy: 5th Australasian Conference, Acisp 2000, Brisbane, Australia, July 10-12, 2000, Proceedings

ISBN: 9783540677420 / Angielski / Miękka / 488 str.

ISBN: 9783540677420/Angielski/Miękka/488 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
E. Dawson; C. Boyd; A. Clark
This text constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and...
This text constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, Q...
cena: 201,72 zł

 Information and Communications Security: 7th International Conference, Icics 2005, Beijing, China, December 10-13, 2005, Proceedings Mao, Wenbo 9783540309345 Springer
Information and Communications Security: 7th International Conference, Icics 2005, Beijing, China, December 10-13, 2005, Proceedings

ISBN: 9783540309345 / Angielski / Miękka / 498 str.

ISBN: 9783540309345/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Quing; Sihan Qing; Wenbo Mao
Constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, China in December 2005. This book features papers that are organized in topical sections on fair exchange, digital signatures, cryptographic protocols, cryptanalysis, network security, and more.
Constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, Chin...
cena: 201,72 zł

 Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings Ira S. Moskowitz 9783540427339 Springer-Verlag Berlin and Heidelberg GmbH &
Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings

ISBN: 9783540427339 / Angielski / Miękka / 414 str.

ISBN: 9783540427339/Angielski/Miękka/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ira S. Moskowitz
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA,...
cena: 201,72 zł

 Advances in Cryptology - Crypto '90: Proceedings Menezes, Alfred J. 9783540545088 Springer
Advances in Cryptology - Crypto '90: Proceedings

ISBN: 9783540545088 / Angielski / Miękka / 650 str.

ISBN: 9783540545088/Angielski/Miękka/650 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alfred J. Menezes; Scott A. Vanstone; A. J. Menezes
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from...
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from ...
cena: 201,72 zł

 Public Key Cryptography - Pkc 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 Okamoto, Tatsuaki 9783540716761 Springer
Public Key Cryptography - Pkc 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007

ISBN: 9783540716761 / Angielski / Miękka / 498 str.

ISBN: 9783540716761/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tatsuaki Okamoto; Xiaoyun Wang

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.


This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, he...

cena: 201,72 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia