• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Transactions on Data Hiding and Multimedia Security III Yun Q. Shi 9783540690160 Springer
Transactions on Data Hiding and Multimedia Security III

ISBN: 9783540690160 / Angielski / Miękka / 91 str.

ISBN: 9783540690160/Angielski/Miękka/91 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and archival research results. This third issue covers steganography and digital watermarking.
LNCS Transactions on Data Hiding and Multimedia Security provides a forum for all researchers in these emerging fields, publishing both original and a...
cena: 201,72 zł

 Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 José A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis 9783540799658 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008

ISBN: 9783540799658 / Angielski / Miękka / 151 str.

ISBN: 9783540799658/Angielski/Miękka/151 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
José A. Onieva;Damien Sauveron;Serge Chaumette
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices held in Seville in May 2008. The ten revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book.
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices held i...
cena: 201,72 zł

 Information Security and Cryptology: Third Sklois Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers Pei, Dingyi 9783540794981 Springer
Information Security and Cryptology: Third Sklois Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

ISBN: 9783540794981 / Angielski / Miękka / 534 str.

ISBN: 9783540794981/Angielski/Miękka/534 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dingyi Pei

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.

The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret...

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Confer...

cena: 201,72 zł

 Rfid Security and Privacy: Concepts, Protocols, and Architectures Henrici, Dirk 9783540790754 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Rfid Security and Privacy: Concepts, Protocols, and Architectures

ISBN: 9783540790754 / Angielski / Twarda / 269 str.

ISBN: 9783540790754/Angielski/Twarda/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dirk Henrici
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me...
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after r...
cena: 605,23 zł

 Coding Theory and Applications: 2nd International Castle Meeting, Ismcta 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Pr Barbero, Angela 9783540874478 Springer
Coding Theory and Applications: 2nd International Castle Meeting, Ismcta 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008, Pr

ISBN: 9783540874478 / Angielski / Miękka / 210 str.

ISBN: 9783540874478/Angielski/Miękka/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Angela Barbero

This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 2008.

The 14 full papers and 5 invited papers presented were carefully reviewed and selected from 34 submissions for inclusion in the book. The papers cover network coding, quantum codes, group codes, codes and combinatorial structures, agebraic-geometry codes, as well as codes and applications.

This book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, ...

cena: 201,72 zł

 Computer Security - Esorics 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings Jajodia, Sushil 9783540883128 Springer
Computer Security - Esorics 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

ISBN: 9783540883128 / Angielski / Miękka / 620 str.

ISBN: 9783540883128/Angielski/Miękka/620 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for...
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held Oct...
cena: 201,72 zł

 Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Lucks, Stefan 9783540883524 Springer
Research in Cryptology: Second Western European Workshop, Weworc 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

ISBN: 9783540883524 / Angielski / Miękka / 170 str.

ISBN: 9783540883524/Angielski/Miękka/170 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Lucks
The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst G] ortzInstituteforSecurityinInformationSystems(HGI), andtheSpecialInt- est Groupon Cryptology(FG Krypto) of the German Computer Science Society (Gesellschaft fu ]r Informatik e.V.). The aim was to bring together researchers in the?eldofcryptology.TheworkshopfocusedonresearchfromMastersandPhD students, and brought them together with more experienced senior researchers. The ?rst workshop (WEWoRC 2005) was held in Leuven. WEWoRC 2007 was held in...
The Western European Workshop on Research in Cryptology (WEWoRC 2007) was the second of its kind. It was organizedas a joint venture between the Horst...
cena: 201,72 zł

 Disappearing Cryptography: Information Hiding: Steganography and Watermarking Peter Wayner 9780123744791 Morgan Kaufmann Publishers
Disappearing Cryptography: Information Hiding: Steganography and Watermarking

ISBN: 9780123744791 / Angielski / Miękka / 439 str.

ISBN: 9780123744791/Angielski/Miękka/439 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Wayner

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at...

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said tec...

cena: 248,21 zł

 E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers Filipe, Joaquim 9783540886525 Springer
E-Business and Telecommunications: 4th International Conference, Icete 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

ISBN: 9783540886525 / Angielski / Miękka / 398 str.

ISBN: 9783540886525/Angielski/Miękka/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquim Filipe
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain. The conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and telecommunications. ICETE is a joint international conf- ence integrating four major areas of knowledge that are divided into four cor- sponding conferences: ICE-B (International Conference on e-Business), SECRYPT (International Conference on Security and...
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31,...
cena: 201,72 zł

 Composition of Secure Multi-Party Protocols: A Comprehensive Study Yehuda Lindell 9783540201052 Springer-Verlag Berlin and Heidelberg GmbH &
Composition of Secure Multi-Party Protocols: A Comprehensive Study

ISBN: 9783540201052 / Angielski / Miękka / 200 str.

ISBN: 9783540201052/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yehuda Lindell

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are...

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of...

cena: 201,72 zł

 Fast Software Encryption: 15th International Workshop, Fse 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers Nyberg, Kaisa 9783540710387 Springer
Fast Software Encryption: 15th International Workshop, Fse 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

ISBN: 9783540710387 / Angielski / Miękka / 489 str.

ISBN: 9783540710387/Angielski/Miękka/489 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaisa Nyberg
FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Research(IACR), andpreviousFSEworkshopshavebeenheldaroundtheworld: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France 2006 Graz, Austria 2007 Luxembourg, Luxembourg The FSE workshop is devoted to the foreground research on fast and secure...
FastSoftwareEncryption(FSE)isthe15thinaseriesofworkshopsonsymmetric cryptography. It is sponsored by the International Association for Cryptologic Res...
cena: 201,72 zł

 New Stream Cipher Designs: The Estream Finalists Robshaw, Matthew 9783540683506 Springer
New Stream Cipher Designs: The Estream Finalists

ISBN: 9783540683506 / Angielski / Miękka / 300 str.

ISBN: 9783540683506/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matthew Robshaw
This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposals to eSTREAM, and 34 candidates were proposed from around the world. Over the following years the submissions were assessed with regard to both...
This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excell...
cena: 201,72 zł

 Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings Safavi-Naini, Reihaneh 9783540850922 Springer
Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings

ISBN: 9783540850922 / Angielski / Miękka / 249 str.

ISBN: 9783540850922/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reihaneh Safavi-Naini
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern...
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at t...
cena: 201,72 zł

 Post-Quantum Cryptography Daniel J. Bernstein 9783540887010 Springer
Post-Quantum Cryptography

ISBN: 9783540887010 / Angielski / Twarda / 246 str.

ISBN: 9783540887010/Angielski/Twarda/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel J. Bernstein

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical...

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader ...

cena: 645,58 zł

 Post-Quantum Cryptography Buchmann, Johannes 9783540884026 Springer
Post-Quantum Cryptography

ISBN: 9783540884026 / Angielski / Miękka / 248 str.

ISBN: 9783540884026/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Johannes Buchmann
Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means...
Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern co...
cena: 242,07 zł

 Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings Willem Jonker, Milan Petkovic 9783540287988 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

ISBN: 9783540287988 / Angielski / Miękka / 246 str.

ISBN: 9783540287988/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker;Milan Petkovic
Althoughcryptographyandsecuritytechniqueshavebeenaroundfor quitesome time, emerging technologies such as ubiquitous computing and ambient intel- gence that exploit increasingly interconnected networks, mobility and pers- alization put new requirements on security with respect to data management. As data is accessible anytime anywhere, according to these new concepts, it - comes much easier to get unauthorized data access. Furthermore, it becomes simpler to collect, store, and search personal information and endanger people s privacy. Therefore, researchin the area of secure data management is...
Althoughcryptographyandsecuritytechniqueshavebeenaroundfor quitesome time, emerging technologies such as ubiquitous computing and ambient intel- gence...
cena: 201,72 zł

 Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings Bart Preneel 9783540605904 Springer-Verlag Berlin and Heidelberg GmbH &
Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings

ISBN: 9783540605904 / Angielski / Miękka / 375 str.

ISBN: 9783540605904/Angielski/Miękka/375 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel
This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are...
This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption h...
cena: 201,72 zł

 Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings Varadharajan, Vijav 9783540632320 Springer
Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings

ISBN: 9783540632320 / Angielski / Miękka / 343 str.

ISBN: 9783540632320/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijav Varadharajan; Josef Pieprzyk; Yi Mu
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NS...
cena: 201,72 zł

 Fast Software Encryption: 4th International Workshop, Fse'97, Haifa, Israel, January 20-22, 1997, Proceedings Biham, Eli 9783540632474 Springer
Fast Software Encryption: 4th International Workshop, Fse'97, Haifa, Israel, January 20-22, 1997, Proceedings

ISBN: 9783540632474 / Angielski / Miękka / 299 str.

ISBN: 9783540632474/Angielski/Miękka/299 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eli Biham
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast...
This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held...
cena: 201,72 zł

 Information Security and Cryptology - Icisc 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Won, Dongho 9783540333548 Springer
Information Security and Cryptology - Icisc 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers

ISBN: 9783540333548 / Angielski / Miękka / 458 str.

ISBN: 9783540333548/Angielski/Miękka/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongho Won; Seungjoo Kim

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005. The 32 revised full papers presented together with two invited talks are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography.


This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 200...

cena: 201,72 zł

Pierwsza Podprzednia  7  8  9  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia