• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Cryptology - Crypto '88: Proceedings Goldwasser, Shafi 9780387971964 Springer
Advances in Cryptology - Crypto '88: Proceedings

ISBN: 9780387971964 / Angielski / Miękka / 591 str.

ISBN: 9780387971964/Angielski/Miękka/591 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shafi Goldwasser; S. Goldwasser
The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2, j. 19SS in Sarita Uarbara, ('alifornia. The conference was sponsored hy the Int- national AssociatioIi for C'ryptologic Research (IAC'R) and hosted by the computer science depart incnt at the llniversity of California at Sarita D- ha ra . 'rile 4-1 papers presented hcrc coniprise: 35 papers selected from 61 - tcwded abstracts subniittctl in response to the call for papcrs, 1 invitcd prv sentations, and 6 papers sclccted from a large niiiii1, cr of informal...
The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2, j. 19SS in Sa...
cena: 201,72 zł

 Recent Advances in Intrusion Detection: 5th International Symposium, Raid 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings Wespi, Andreas 9783540000204 Springer
Recent Advances in Intrusion Detection: 5th International Symposium, Raid 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings

ISBN: 9783540000204 / Angielski / Miękka / 327 str.

ISBN: 9783540000204/Angielski/Miękka/327 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Z. Kmiec; A. Wespi; G. Vigna
On behalf of the program committee, it is our pleasure to present to you the proceedings of the Fifth Symposium on Recent Advances in Intrusion Detection (RAID). Since its ?rst edition in 1998, RAID has established itself as the main annual intrusion detection event, attracting researchers, practitioners, and v- dors from all over the world. The RAID 2002 program committee received 81 submissions (64 full papers and 17 extended abstracts) from 20 countries. This is about 50% more than last year. All submissions were carefully reviewed by at least three program comm- tee members or additional...
On behalf of the program committee, it is our pleasure to present to you the proceedings of the Fifth Symposium on Recent Advances in Intrusion Detect...
cena: 201,72 zł

 Selected Areas in Cryptography: 9th Annual International Workshop, Sac 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers Nyberg, Kaisa 9783540006220 Springer
Selected Areas in Cryptography: 9th Annual International Workshop, Sac 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers

ISBN: 9783540006220 / Angielski / Miękka / 412 str.

ISBN: 9783540006220/Angielski/Miękka/412 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
K. Ed Nyberg; Kaisa Nyberg
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen's University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), Univ- sity of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshopis to provide a relaxedatmosphere in which researchersin cr- tography can present and discuss new work on selected areasof current interest. The traditional themes for SAC workshops are: - Design and analysis of symmetric key cryptosystems. - Primitives for private-key...
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen's University in Kingston (1994, 1...
cena: 201,72 zł

 Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings Vijay Varadharajan, Yi Mu 9783540423003 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings

ISBN: 9783540423003 / Angielski / Miękka / 522 str.

ISBN: 9783540423003/Angielski/Miękka/522 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Varadharajan;Yi Mu
This title constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001. The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access control, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
This title constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Au...
cena: 201,72 zł

 advances in cryptology 1981 - 1997: electronic proceedings and index of the crypto and eurocrypt conference, 1981 - 1997  McCurley, Kevin S. 9783540650690 Springer
advances in cryptology 1981 - 1997: electronic proceedings and index of the crypto and eurocrypt conference, 1981 - 1997

ISBN: 9783540650690 / Angielski / Miękka / 464 str.

ISBN: 9783540650690/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
K. S. McCurley; C. D. Ziegler; Kevin S. McCurley
AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence, themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to...
AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was ...
cena: 423,49 zł

 Cryptographic Hardware and Embedded Systems - Ches 2000: Second International Workshop Worcester, Ma, Usa, August 17-18, 2000 Proceedings Koc, Cetin K. 9783540414551 Springer
Cryptographic Hardware and Embedded Systems - Ches 2000: Second International Workshop Worcester, Ma, Usa, August 17-18, 2000 Proceedings

ISBN: 9783540414551 / Angielski / Miękka / 360 str.

ISBN: 9783540414551/Angielski/Miękka/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin K. Koc; Christof Paar; C. K. Koc
These are the pre-proceedings of CHES 2000, the second workshop on Cryp- graphicHardware andEmbedded Systems. The rst workshop, CHES 99, which was held at WPI in August 1999, was received quite enthusiastically by people in academia and industry who are interested in hardware and software imp- mentations of cryptography. We believe there has been a long-standing need for a workshop series combining theory and practice for integrating strong data - curity into modern communications and e-commerce applications. We are very glad that we had the opportunity to serve this purpose and to create the...
These are the pre-proceedings of CHES 2000, the second workshop on Cryp- graphicHardware andEmbedded Systems. The rst workshop, CHES 99, which was hel...
cena: 201,72 zł

 Public-Key Cryptography Arto Salomaa 9783540613565 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Public-Key Cryptography

ISBN: 9783540613565 / Angielski / Twarda / 275 str.

ISBN: 9783540613565/Angielski/Twarda/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arto Salomaa
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
cena: 201,72 zł

 Cryptanalytic Attacks on Rsa Yan, Song Y. 9780387487410 SPRINGER-VERLAG NEW YORK INC.
Cryptanalytic Attacks on Rsa

ISBN: 9780387487410 / Angielski / Twarda / 255 str.

ISBN: 9780387487410/Angielski/Twarda/255 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.

Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number...

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and...

cena: 403,47 zł

 Terrestrial Trunked Radio - TETRA: A Global Security Tool Stavroulakis, Peter 9783540711902 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Terrestrial Trunked Radio - TETRA: A Global Security Tool

ISBN: 9783540711902 / Angielski / Twarda / 302 str.

ISBN: 9783540711902/Angielski/Twarda/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Stavroulakis

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative...

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased se...

cena: 605,23 zł

 Secure Data Management: 4th Vldb Workshop, Sdm 2007, Vienna, Austria, September 23-24, 2007, Proceedings Jonker, Willem 9783540752479 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Secure Data Management: 4th Vldb Workshop, Sdm 2007, Vienna, Austria, September 23-24, 2007, Proceedings

ISBN: 9783540752479 / Angielski / Miękka / 216 str.

ISBN: 9783540752479/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management. As data are accessible anytime anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search...
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing an...
cena: 201,72 zł

 Information Security: 10th International Conference, Isc 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings Garay, Juan 9783540754954 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security: 10th International Conference, Isc 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings

ISBN: 9783540754954 / Angielski / Miękka / 440 str.

ISBN: 9783540754954/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The 10th Information Security Conference (ISC 2007) was held in Valpara ?so, Chile, October 9 12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was ?rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004),...
The 10th Information Security Conference (ISC 2007) was held in Valpara ?so, Chile, October 9 12, 2007. ISC is an annual international conference cove...
cena: 201,72 zł

 Theory of Cryptography: Fifth Theory of Cryptography Conference, Tcc 2008, New York, Usa, March 19-21, 2008, Proceedings Canetti, Ran 9783540785231 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Theory of Cryptography: Fifth Theory of Cryptography Conference, Tcc 2008, New York, Usa, March 19-21, 2008, Proceedings

ISBN: 9783540785231 / Angielski / Miękka / 645 str.

ISBN: 9783540785231/Angielski/Miękka/645 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The...
cena: 403,47 zł

 Public Key Cryptography - Pkc 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008,  9783540784395 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Public Key Cryptography - Pkc 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008,

ISBN: 9783540784395 / Angielski / Miękka / 402 str.

ISBN: 9783540784395/Angielski/Miękka/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008.

The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.

This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held...

cena: 201,72 zł

 Real-Time System Security Brett Tjaden, Lonnie R Welch 9781590335864 Nova Science Publishers Inc
Real-Time System Security

ISBN: 9781590335864 / Angielski / Twarda / 142 str.

ISBN: 9781590335864/Angielski/Twarda/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brett Tjaden;Lonnie R Welch
Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven) wide dynamic range of system operation, the number of data elements to be processed in an arbitrary period is unknown at the time of system engineering (other than an extremely pessimistic worst case sense). While it may be possible to determine a theoretical upper bound on the number of data items, the construction and maintenance of system components to handle worst-case conditions can be prohibitively costly. To accommodate such dynamic...
Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven)...
cena: 340,69 zł

 Spyware John S Yang 9781594546488 Nova Science Publishers Inc
Spyware

ISBN: 9781594546488 / Angielski / Twarda / 92 str.

ISBN: 9781594546488/Angielski/Twarda/92 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John S Yang
'Spyware' is used to refer to any software that is downloaded onto a person's computer without their knowledge. The Federal Trade Commission (FTC) issued a consumer alert on spyware, providing a list of warning signs that might indicate that a computer is
'Spyware' is used to refer to any software that is downloaded onto a person's computer without their knowledge. The Federal Trade Commission (FTC) iss...
cena: 358,63 zł

 Topics in Cryptology - Ct-Rsa 2008: The Cryptographers' Track at the Rsa Conference 2008, San Francisco, Ca, Usa, April 8-11, 2008, Proceedings Malkin, Tal 9783540792628 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Topics in Cryptology - Ct-Rsa 2008: The Cryptographers' Track at the Rsa Conference 2008, San Francisco, Ca, Usa, April 8-11, 2008, Proceedings

ISBN: 9783540792628 / Angielski / Miękka / 437 str.

ISBN: 9783540792628/Angielski/Miękka/437 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008.

The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography...

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA...

cena: 201,72 zł

 Advances in Cryptology - Eurocrypt 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Tu Smart, Nigel 9783540789666 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Advances in Cryptology - Eurocrypt 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Tu

ISBN: 9783540789666 / Angielski / Miękka / 564 str.

ISBN: 9783540789666/Angielski/Miękka/564 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008. The 31 revised full papers presented were carefully reviewed and selected from 163 submissions.

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT...

cena: 201,72 zł

 Information Security Practice and Experience: 4th International Conference, Ispec 2008 Sydney, Australia, April 21-23, 2008 Proceedings Chen, Liqun 9783540791034 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security Practice and Experience: 4th International Conference, Ispec 2008 Sydney, Australia, April 21-23, 2008 Proceedings

ISBN: 9783540791034 / Angielski / Miękka / 420 str.

ISBN: 9783540791034/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of papers.
weeks. Each paper was carefully evaluated by at least two or three people. There was signi?cant online discussion about a large number of papers.
cena: 201,72 zł

 Progress in Cryptology - Africacrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings Vaudenay, Serge 9783540681595 Springer
Progress in Cryptology - Africacrypt 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings

ISBN: 9783540681595 / Angielski / Miękka / 420 str.

ISBN: 9783540681595/Angielski/Miękka/420 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serge Vaudenay
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in J...
cena: 201,72 zł

 Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, Ny, Usa, June 3-6, 2008, Proceedings Bellovin, Steven M. 9783540689133 Springer
Applied Cryptography and Network Security: 6th International Conference, Acns 2008, New York, Ny, Usa, June 3-6, 2008, Proceedings

ISBN: 9783540689133 / Angielski / Miękka / 508 str.

ISBN: 9783540689133/Angielski/Miękka/508 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven M. Bellovin
ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia University. ACNS 2008 was organized in cooperation with the International - sociation for Cryptologic Research (IACR) and the Department of Computer Science at Columbia University. The General Chairs of the conference were - gelos Keromytis and Moti Yung. The conference received 131 submissions, of which the Program Committee, chairedbyStevenBellovinandRosarioGennaro, selected 30 for presentation at the conference. The Best Student Paper Award was given...
ACNS2008, the6thInternationalConferenceonAppliedCryptographyandN- work Security, was held in New York, New York, June 3-6, 2008, at Columbia Universit...
cena: 201,72 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia