Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Linux Security Fundamentals, Clinton David


Варианты приобретения
Цена: 4909.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Clinton David
Название:  Linux Security Fundamentals
ISBN: 9781119781462
Издательство: Wiley
Классификация:


ISBN-10: 1119781469
Обложка/Формат: Paperback
Страницы: 192
Вес: 0.32 кг.
Дата издания: 10.11.2020
Язык: English
Размер: 23.11 x 18.54 x 1.27 cm
Читательская аудитория: Professional & vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

Includes one year of FREE access after activation to the online test bank and study tools:

  • Custom practice exam
  • 100 electronic flashcards
  • Searchable key term glossary

The Sybex(TM) method for teaching Linux(R) security concepts

Understanding Linux Security is essential for administration professionals. Linux Security Fundamentals covers all the IT security basics to help active and aspiring admins respond successfully to the modern threat landscape. Youll improve your ability to combat major security threats against computer systems, networks, and services. Youll discover how to prevent and mitigate attacks against personal devices and how to encrypt secure data transfers through networks, storage devices, or the cloud. Linux Security Fundamentals teaches:

  • Using Digital Resources Responsibly
  • What Vulnerabilities and Threats Are
  • Controlling Access to Your Assets
  • Controlling Network Connections
  • Encrypting Data, Whether at Rest or Moving
  • Risk Assessment
  • Configuring System Backups and Monitoring
  • Resource Isolation Design Patterns

Interactive learning environment

Take your skills to the next level with Sybexs superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access to:

  • Interactive test bank with a practice exam to help you identify areas where you need to expand your knowledge
  • 100 electronic flashcards to reinforce what youve learned
  • Comprehensive glossary in PDF format gives you instant access to key terms you use in your job



Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes

Автор: Mining Ethem
Название: Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes
ISBN: 1914028120 ISBN-13(EAN): 9781914028120
Издательство: Неизвестно
Рейтинг:
Цена: 3111.00 р.
Наличие на складе: Нет в наличии.

Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801541086 ISBN-13(EAN): 9781801541084
Издательство: Неизвестно
Рейтинг:
Цена: 3309.00 р.
Наличие на складе: Нет в наличии.

Описание: Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp

Автор: Smith Michael
Название: Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp
ISBN: 1801571252 ISBN-13(EAN): 9781801571258
Издательство: Неизвестно
Рейтинг:
Цена: 3585.00 р.
Наличие на складе: Нет в наличии.

Описание:

A beginners Guide to Kali Linux


The truth is: Kali Linux is an open-source project which is maintained and funded by Offensive Security. It provides state-of-the-art information security training and penetration testing services.


Do you want to know more about Kali Linux? Do you want to increase your knowledge about Kali Linux? Read on...It is a Debian-based Linux distribution which aims at advanced penetration Testing and Security Auditing. There are various tools in Kali which look after information security tasks like Security Research, Computer Forensics, Penetration Testing, and Reverse Engineering.

Released on 13th March, 2013, it is a comprehensive rebuild of the BackTrack Linux, maintaining the Debian development standards. Kali Linux includes more than 600 penetration testing tools. There were many tools in backtrack which needed a review as some of them did not work whereas the others were a duplicate of the tools having similar functions.


Linux for Hackers


The truth is: If cybersecurity is one of the careers you are looking forward to you should learn Linux to be the best in your profession. Linux is extremely important to security.


Linux is an open-source as a result of which tool developers get an extra advantage. Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.

Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber attack. This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorised access to computerized systems and data centres. Any kind of information security which is des


You will also learn:


- The basic of Kali Linux

- Step-by-step guide on how to install and download

- Uses and applications of Kali Linux

- List of all uses with applications

- How scanning of devices in a network works

- Learning the essential hacking command line

- How Linux commands can be used in hacking

- Examples of uses

- A Guide on how networking command line work

- What is the used of logging for hackers

and More.....



Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp

Автор: Smith Michael
Название: Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp
ISBN: 180157135X ISBN-13(EAN): 9781801571357
Издательство: Неизвестно
Рейтинг:
Цена: 4964.00 р.
Наличие на складе: Нет в наличии.

Описание:

A beginners Guide to Kali Linux


The truth is: Kali Linux is an open-source project which is maintained and funded by Offensive Security. It provides state-of-the-art information security training and penetration testing services.


Do you want to know more about Kali Linux? Do you want to increase your knowledge about Kali Linux? Read on...It is a Debian-based Linux distribution which aims at advanced penetration Testing and Security Auditing. There are various tools in Kali which look after information security tasks like Security Research, Computer Forensics, Penetration Testing, and Reverse Engineering.

Released on 13th March, 2013, it is a comprehensive rebuild of the BackTrack Linux, maintaining the Debian development standards. Kali Linux includes more than 600 penetration testing tools. There were many tools in backtrack which needed a review as some of them did not work whereas the others were a duplicate of the tools having similar functions.


Linux for Hackers


The truth is: If cybersecurity is one of the careers you are looking forward to you should learn Linux to be the best in your profession. Linux is extremely important to security.


Linux is an open-source as a result of which tool developers get an extra advantage. Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.

Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber attack. This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorised access to computerized systems and data centres. Any kind of information security which is des


You will also learn:


- The basic of Kali Linux

- Step-by-step guide on how to install and download

- Uses and applications of Kali Linux

- List of all uses with applications

- How scanning of devices in a network works

- Learning the essential hacking command line

- How Linux commands can be used in hacking

- Examples of uses

- A Guide on how networking command line work

- What is the used of logging for hackers

and More.....



Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801540985 ISBN-13(EAN): 9781801540988
Издательство: Неизвестно
Рейтинг:
Цена: 4689.00 р.
Наличие на складе: Нет в наличии.

Описание: Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp

Автор: Smith Michael
Название: Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp
ISBN: 1801828555 ISBN-13(EAN): 9781801828550
Издательство: Неизвестно
Рейтинг:
Цена: 5378.00 р.
Наличие на складе: Нет в наличии.

Описание:



55 % discount for bookstores Now At $38.99 instead of $ 40.93 $



Your customers will never stop reading this guide


A beginners Guide to Kali Linux


The truth is: Kali Linux is an open-source project which is maintained and funded by Offensive Security. It provides state-of-the-art information security training and penetration testing services.


Do you want to know more about Kali Linux? Do you want to increase your knowledge about Kali Linux? Read on...It is a Debian-based Linux distribution which aims at advanced penetration Testing and Security Auditing. There are various tools in Kali which look after information security tasks like Security Research, Computer Forensics, Penetration Testing, and Reverse Engineering.



Linux for Hackers


The truth is: If cybersecurity is one of the careers you are looking forward to you should learn Linux to be the best in your profession. Linux is extremely important to security.


Linux is an open-source as a result of which tool developers get an extra advantage. Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.

Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber attack. This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorised access to computerized systems and data centres. Any kind of information security which is des


You will also learn:


- The basic of Kali Linux

- Step-by-step guide on how to install and download

- Uses and applications of Kali Linux

- List of all uses with applications

- How scanning of devices in a network works

- Learning the essential hacking command line

- How Linux commands can be used in hacking

- Examples of uses

- A Guide on how networking command line work

- What is the used of logging for hackers


Buy it Now and let your customers get addicted to this amazing book


Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801828695 ISBN-13(EAN): 9781801828697
Издательство: Неизвестно
Рейтинг:
Цена: 5930.00 р.
Наличие на складе: Нет в наличии.

Описание:
55 % discount for bookstores Now At $43.99 instead of $ 67.63 $



Your customers will never stop reading this guide



Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Buy it Now and let your customers get addicted to this amazing book
Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.

Автор: Treu Peter
Название: Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.
ISBN: 1801259518 ISBN-13(EAN): 9781801259514
Издательство: Неизвестно
Рейтинг:
Цена: 2757.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? THEN KEEP READING...


Hacking is becoming more complex and sophisticated, and companies are scrambling to protect their digital assets against threats by setting up cybersecurity systems. These systems need to be routinely checked to ensure that these systems do the jobs they're designed to do.

The people who can do these checks are penetration testers and ethical hackers, programmers who are trained to find and exploit vulnerabilities in networks and proffer ways to cover them up.

Now more than ever, companies are looking for penetration testers and cybersecurity professionals who have practical, hands-on experience with Kali Linux and other open-source hacking tools.

In this powerful book, you're going to learn how to master the industry-standard platform for hacking, penetration and security testing-Kali Linux.

This book assumes you know nothing about Kali Linux and hacking and will start from scratch and build up your practical knowledge on how to use Kali Linux and other open-source tools to become a hacker as well as understand the processes behind a successful penetration test.


In This Book you will Learn:


  • Definition of Hacking andiTypes of Hacker
  • Cybersecurity and Types of Cyber Attacks
  • Types of Malware and How the Hacking Process Works
  • Why Hackers Use Linux
  • Scanning (nmap, imassscan, ihping3) and Managing Networks (Wireshark)
  • Kali Linux on Portable Devices
  • Bypassing a Hidden SSH and Bypassing a Mac Address Authentication
  • Secure and Anonymous Using Tor, Proxy Chains, and VPN
  • IP Spoofing
  • Penetration Testing with Metasploit


Would you like to know more? Download the Book, Kali Linux Hacking


Scroll to the top of the page and click the "Buy now" button to get your copy now.


Fundamentals Of Network Security

Название: Fundamentals Of Network Security
ISBN: 1580531768 ISBN-13(EAN): 9781580531764
Издательство: Artech House
Рейтинг:
Цена: 13675.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Many books focus on one operating system when considering network security. John E. Canavan`s reference work covers principles and practical applications that can be used with all operating systems.

Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp

Автор: Smith Michael
Название: Linux Hacking: 2 Books in 1 - A Beginners Guide Step by Step to Learn The Fundamentals of Cyber Security, Hacking and more about Comp
ISBN: 1801828687 ISBN-13(EAN): 9781801828680
Издательство: Неизвестно
Рейтинг:
Цена: 6758.00 р.
Наличие на складе: Нет в наличии.

Описание:



55 % discount for bookstores Now At $ 48.99 instead of $ 75.93 $



Your customers will never stop reading this guide


A beginners Guide to Kali Linux


The truth is: Kali Linux is an open-source project which is maintained and funded by Offensive Security. It provides state-of-the-art information security training and penetration testing services.


Do you want to know more about Kali Linux? Do you want to increase your knowledge about Kali Linux? Read on...It is a Debian-based Linux distribution which aims at advanced penetration Testing and Security Auditing. There are various tools in Kali which look after information security tasks like Security Research, Computer Forensics, Penetration Testing, and Reverse Engineering.



Linux for Hackers


The truth is: If cybersecurity is one of the careers you are looking forward to you should learn Linux to be the best in your profession. Linux is extremely important to security.


Linux is an open-source as a result of which tool developers get an extra advantage. Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.

Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber attack. This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorised access to computerized systems and data centres. Any kind of information security which is des


You will also learn:


- The basic of Kali Linux

- Step-by-step guide on how to install and download

- Uses and applications of Kali Linux

- List of all uses with applications

- How scanning of devices in a network works

- Learning the essential hacking command line

- How Linux commands can be used in hacking

- Examples of uses

- A Guide on how networking command line work

- What is the used of logging for hackers


Buy it Now and let your customers get addicted to this amazing book


Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801828563 ISBN-13(EAN): 9781801828567
Издательство: Неизвестно
Рейтинг:
Цена: 4689.00 р.
Наличие на складе: Нет в наличии.

Описание:
55 % discount for bookstores Now At $33.99 instead of $ 52.68 $



Your customers will never stop reading this guide



Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Buy it Now and let your customers get addicted to this amazing book
Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.

Автор: Treu Peter
Название: Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.
ISBN: 1801449902 ISBN-13(EAN): 9781801449908
Издательство: Неизвестно
Рейтинг:
Цена: 4137.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? THEN KEEP READING...


Hacking is becoming more complex and sophisticated, and companies are scrambling to protect their digital assets against threats by setting up cybersecurity systems. These systems need to be routinely checked to ensure that these systems do the jobs they're designed to do.

The people who can do these checks are penetration testers and ethical hackers, programmers who are trained to find and exploit vulnerabilities in networks and proffer ways to cover them up.

Now more than ever, companies are looking for penetration testers and cybersecurity professionals who have practical, hands-on experience with Kali Linux and other open-source hacking tools.

In this powerful book, you're going to learn how to master the industry-standard platform for hacking, penetration and security testing-Kali Linux.

This book assumes you know nothing about Kali Linux and hacking and will start from scratch and build up your practical knowledge on how to use Kali Linux and other open-source tools to become a hacker as well as understand the processes behind a successful penetration test.


In This Book you will Learn:


  • Definition of Hacking andiTypes of Hacker
  • Cybersecurity and Types of Cyber Attacks
  • Types of Malware and How the Hacking Process Works
  • Why Hackers Use Linux
  • Scanning (nmap, imassscan, ihping3) and Managing Networks (Wireshark)
  • Kali Linux on Portable Devices
  • Bypassing a Hidden SSH and Bypassing a Mac Address Authentication
  • Secure and Anonymous Using Tor, Proxy Chains, and VPN
  • IP Spoofing
  • Penetration Testing with Metasploit


Would you like to know more? Download the Book, Kali Linux Hacking


Scroll to the top of the page and click the "Buy now" button to get your copy now.



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия