Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Cybersecurity Risk Management: Mastering the Fundamentals Using the Nist Cybersecurity Framework, Brumfield Cynthia


Варианты приобретения
Цена: 92870.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 205 шт.  
При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Brumfield Cynthia
Название:  Cybersecurity Risk Management: Mastering the Fundamentals Using the Nist Cybersecurity Framework
ISBN: 9781119816287
Издательство: Wiley
Классификация:

ISBN-10: 1119816289
Обложка/Формат: Hardcover
Страницы: 224
Вес: 0.48 кг.
Дата издания: 09.12.2021
Язык: English
Размер: 25.65 x 17.53 x 1.52 cm
Читательская аудитория: Professional & vocational
Подзаголовок: Mastering the fundamentals using the nist cybersecurity framework
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: Cybersecurity Risk Management

In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.

With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices.

Filled with clear and easy-to-follow advice, this book also offers readers:

  • A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities
  • A valuable exploration of modern tools that can improve an organizations network infrastructure protection
  • A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring
  • A helpful examination of the recovery from cybersecurity incidents

Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.


Automotive cybersecurity issues and vulnerabilities /

Автор: Craig Gibbs
Название: Automotive cybersecurity issues and vulnerabilities /
ISBN: 1634859871 ISBN-13(EAN): 9781634859875
Издательство: Nova Science
Рейтинг:
Цена: 96090.00 T
Наличие на складе: Невозможна поставка.
Описание: Modern vehicles contain multiple interfaces -- connections between the vehicle and external networks -- that leave vehicle systems, including safety-critical systems, such as braking and steering, vulnerable to cyberattacks. Researchers have shown that these interfaces -- if not properly secured -- can be exploited through direct, physical access to a vehicle, as well as remotely through short-range and long-range wireless channels. This book addresses, among other things, available information about the key cybersecurity vulnerabilities in modern vehicles that could impact passenger safety; key practices and technologies, if any, available to mitigate vehicle cybersecurity vulnerabilities and the impacts of potential attacks; views of selected stakeholders on challenges they face related to vehicle cybersecurity and industry-led efforts to address vehicle cybersecurity; and Department of Transportations (DOT) efforts to address vehicle cybersecurity.

Cybersecurity for Information Professionals

Автор: Chang, Hsia-Ching , Hawamdeh, Suliman
Название: Cybersecurity for Information Professionals
ISBN: 0367486814 ISBN-13(EAN): 9780367486815
Издательство: Taylor&Francis
Рейтинг:
Цена: 51440.00 T
Наличие на складе: Есть
Описание: The book is an introduction to essential concepts of cybersecurity and information security and the methods and techniques used to combat cybersecurity threats and vulnerabilities. It covers broad areas related to cybersecurity and information security issues such as cybersecurity infrastructure, technologies, research, and product development.

Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801540985 ISBN-13(EAN): 9781801540988
Издательство: Неизвестно
Рейтинг:
Цена: 31260.00 T
Наличие на складе: Нет в наличии.
Описание: Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices



Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801828563 ISBN-13(EAN): 9781801828567
Издательство: Неизвестно
Рейтинг:
Цена: 31260.00 T
Наличие на складе: Нет в наличии.
Описание:
55 % discount for bookstores Now At $33.99 instead of $ 52.68 $



Your customers will never stop reading this guide



Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Buy it Now and let your customers get addicted to this amazing book

Cybersecurity Workforce: Staffing Needs, Skills Requirements and Coding Procedures

Автор: Maximilian Biermann
Название: Cybersecurity Workforce: Staffing Needs, Skills Requirements and Coding Procedures
ISBN: 1536158186 ISBN-13(EAN): 9781536158182
Издательство: Nova Science
Рейтинг:
Цена: 149940.00 T
Наличие на складе: Невозможна поставка.
Описание: The security of federal information systems and data is critical to the nations safety, prosperity, and well-being. However, federal systems and networks are inherently at risk because of their complexity, technological diversity, and geographic dispersion. Further, threats to federal information technology (IT) infrastructure continue to grow in number and sophistication, posing a risk to the reliable functioning of our government. A key component of the governments ability to mitigate and respond to cybersecurity threats is having a qualified, well-trained cybersecurity workforce. The objectives of chapter 1 are to determine the extent to which federal agencies have assigned work roles for positions performing IT, cybersecurity, or cyber-related functions and describe the steps federal agencies took to identify work roles of critical need. As reported in chapter 2, DHS has identified, categorized, and assigned employment codes to its cybersecurity positions and identified its cybersecurity workforce areas of critical need. Chapter 3 assessed whether: OPM developed a coding structure and procedures for assigning codes to cybersecurity positions and submitted a progress report to Congress; CFO Act agencies submitted complete, reliable baseline assessments of their cybersecurity workforces; and CFO Act agencies established procedures to assign codes to cybersecurity positions.

Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing

Автор: Davis Robert, Smith Michael
Название: Kali Linux and Cybersecurity: 2 books in 1: A Complete Guide to Learn the Fundamentals of Cyber Security, Hacking and Penetration Testing
ISBN: 1801828695 ISBN-13(EAN): 9781801828697
Издательство: Неизвестно
Рейтинг:
Цена: 39530.00 T
Наличие на складе: Нет в наличии.
Описание:
55 % discount for bookstores Now At $43.99 instead of $ 67.63 $



Your customers will never stop reading this guide



Hacking


Linux is an open source, as a result of which tool developers get an extra advantage.


Are you interested to learn about an operating system which is not only transparent but also can be manipulated in as many ways as possible? Read On to get well aware of one such OS, which is nothing but Linux.


Due to its flexibility, most of the cybersecurity tools are written to run on Linux. Cybersecurity is the protection of every system which is connected through the internet, from any kind of cyber-attack.


This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers.


Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity.


Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood.


The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity.


You will also learn:


- The basic of Kali Linux

- What are the uses of logging for hackers

- How to scan the server and the network

- The process of hacking and how attackers cover their traces

- The basic of cybersecurity

- Protect yourself from cyber-attacks and secure your computer and other devices


Buy it Now and let your customers get addicted to this amazing book

Transforming Cybersecurity Solutions Using Blockchain

Автор: Agrawal Rashmi, Gupta Neha
Название: Transforming Cybersecurity Solutions Using Blockchain
ISBN: 9813368578 ISBN-13(EAN): 9789813368576
Издательство: Springer
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain.

A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It

Автор: Parenty Thomas, Domet Jack
Название: A Leader`s Guide to Cybersecurity: Why Boards Need to Lead--And How to Do It
ISBN: 1633697991 ISBN-13(EAN): 9781633697997
Издательство: NBN International
Рейтинг:
Цена: 35200.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.

Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide.

Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility.

In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes:

  • Understanding cyber risks and how best to control them
  • Planning and preparing for a crisis--and leading in its aftermath
  • Making cybersecurity a companywide initiative and responsibility
  • Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures
  • Aligning the board, executive leadership, and cybersecurity teams on priorities

Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.


Nist Cybersecurity Framework a Complete Guide - 2019 Edition

Автор: Blokdyk Gerardus
Название: Nist Cybersecurity Framework a Complete Guide - 2019 Edition
ISBN: 0655537813 ISBN-13(EAN): 9780655537816
Издательство: Неизвестно
Рейтинг:
Цена: 122770.00 T
Наличие на складе: Невозможна поставка.
Описание:

How do you appropriately integrate cyber security risk into business risk? How do you promote an integrated approach to risk management? How will the eu cyber security directive affect business? Are all pcs compliant (i.e. fully patched)?

This premium NIST Cybersecurity Framework self-assessment will make you the assured NIST Cybersecurity Framework domain leader by revealing just what you need to know to be fluent and ready for any NIST Cybersecurity Framework challenge.

How do I reduce the effort in the NIST Cybersecurity Framework work to be done to get problems solved? How can I ensure that plans of action include every NIST Cybersecurity Framework task and that every NIST Cybersecurity Framework outcome is in place? How will I save time investigating strategic and tactical options and ensuring NIST Cybersecurity Framework costs are low? How can I deliver tailored NIST Cybersecurity Framework advice instantly with structured going-forward plans?

There's no better guide through these mind-expanding questions than acclaimed best-selling author Gerard Blokdyk. Blokdyk ensures all NIST Cybersecurity Framework essentials are covered, from every angle: the NIST Cybersecurity Framework self-assessment shows succinctly and clearly that what needs to be clarified to organize the required activities and processes so that NIST Cybersecurity Framework outcomes are achieved.

Contains extensive criteria grounded in past and current successful projects and activities by experienced NIST Cybersecurity Framework practitioners. Their mastery, combined with the easy elegance of the self-assessment, provides its superior value to you in knowing how to ensure the outcome of any efforts in NIST Cybersecurity Framework are maximized with professional results.

Your purchase includes access details to the NIST Cybersecurity Framework self-assessment dashboard download which gives you your dynamically prioritized projects-ready tool and shows you exactly what to do next. Your exclusive instant access details can be found in your book. You will receive the following contents with New and Updated specific criteria:

- The latest quick edition of the book in PDF

- The latest complete edition of the book in PDF, which criteria correspond to the criteria in...

- The Self-Assessment Excel Dashboard

- Example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation

- In-depth and specific NIST Cybersecurity Framework Checklists

- Project management checklists and templates to assist with implementation

INCLUDES LIFETIME SELF ASSESSMENT UPDATES

Every self assessment comes with Lifetime Updates and Lifetime Free Updated Books. Lifetime Updates is an industry-first feature which allows you to receive verified self assessment updates, ensuring you always have the most accurate information at your fingertips.


Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture

Автор: Handa Anand, Negi Rohit, Shukla Sandeep
Название: Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture
ISBN: 8770224234 ISBN-13(EAN): 9788770224239
Издательство: Taylor&Francis
Рейтинг:
Цена: 99010.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. This book has 8 chapters describing these projects in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.


Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft

Автор: Bailey Sean M., Devin Kropp
Название: Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft
ISBN: 0997729007 ISBN-13(EAN): 9780997729009
Издательство: Неизвестно
Цена: 18350.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Everyone is besieged by a nonstop cyber-crime wave that victimizes millions of people and businesses each year. And trouble usually starts with a click.

In just the next 24 hours:

  • Scammers will target the public with 94 billion emails
  • Hackers will seize and hold 88,000 computers for ransom
  • Identity thieves will impersonate 35,000 people

How we handle our online security is critical to protecting our personal and professional lives. But guidance for staying safe has been fragmented and confusing--until now.

Hack-Proof Your Life Now demystifies the topic and introduces you to the New Cybersecurity Rules--clear, sensible, and do-able actions that will quickly improve your security.

Can anyone really be safe and secure online? Yes, there is a way to quickly shut down hackers, thieves, and identity scammers and enjoy good online security, say authors Sean M. Bailey and Devin Kropp. They contend that anyone can dramatically boost their online security by taking a handful of inexpensive and easy-to-accomplish actions.

Their book begins by asking the reader to measure his or her online security with a 10-question cybersecurity quiz. Nearly everyone scores poorly. But that changes quickly as the authors introduce the New Cybersecurity Rules, a set of 15 principles organized around three mindsets that must be cultivated in order to achieve higher security:

Secrecy. Email addresses, passwords, credit files, Social Security numbers, and other personal information need greater levels of protection. Governments and private companies have done a miserable job guarding personal data. Only individual actions can limit exposure to hackers' data breaches. The authors offer eight secrecy-boosting rules, including this one: Stop using a personal email address for online banking and credit accounts. It's too easily stolen. Instead, create a financial-only email account to use exclusively for finances. That limits exposure to just a few secure places on the Internet where the financial-only email resides, making it harder for hackers to scoop up and exploit.

Omniscience. Just like the financial services industry, consumers must use technology to become "financially all-knowing" and monitor--in real time-- personal banking and credit matters. By placing one's self at the center of online security (a key theme of the book), everyone can rest assured that identity thieves aren't quietly stealing their money or ruining their credit. One recommended omniscience rule: Set up notifications on banking and credit cards to instantly become aware whenever cash leaves any accounts or when credit is charged. It's a way to instantly spot fraud or identity theft, a solid protection to have at no extra cost.

Mindfulness. Enacting the New Cybersecurity Rules instills a stronger security mindset, the authors tell us. But how can it be maintained? Safety degrades without permanent changes to computer behaviors and security awareness. But the hackers never sleep. Even the best protected inbox will still receive a few dangerous emails. What to do? The authors suggest their 10-Second EMAIL Rule, an easy to remember mnemonic for staying mindful of avoiding malicious links. EMAIL stands for "Examine Message and Inspect Links" and shows how to spot and unmask dangerous blackmail spam and identity theft malware. It's a Zen-like practice that can benefit everyone every time they check their email.


Cybersecurity Fundamentals for Finance and Accounting Professionals Certificate

Автор: Aicpa
Название: Cybersecurity Fundamentals for Finance and Accounting Professionals Certificate
ISBN: 1119544750 ISBN-13(EAN): 9781119544753
Издательство: Wiley
Рейтинг:
Цена: 554400.00 T
Наличие на складе: Невозможна поставка.
Описание:

The Cybersecurity Fundamentals for Finance and Accounting Professionals Certificate course (15.5 CPE Credits) will help you develop fluency and gain confidence to make sound strategic decisions regarding cybersecurity risk. You'll also learn what you should be doing as a non-IT professional, to help protect your clients and your organization from cyber threats.

Understand cybersecurity--and be part of the solution.

The threats from cyber-attacks are real, and can:

  • Disrupt businesses
  • Result in financial losses
  • Destroy an organization's reputation

In fact, cybercrime damage costs are expected to hit $6 trillion annually by 2021. Organizations are under pressure to show that they have effective processes in place to detect, mitigate, and recover from cybersecurity events.

This certificate course gives you a foundation in cybersecurity so you can provide valuable leadership within your organization--or with your clients.

What do you need to know about cybersecurity?

You don't have to become an IT expert. But, you do need to be able to speak intelligently and:

  • Understand key elements of the AICPA's cybersecurity risk management reporting framework;
  • Learn the terminology and the right questions to ask;
  • Understand the potential risks and opportunities for your organization or clients;
  • Help advise on investments in cybersecurity or identify roles for cybersecurity specialists; and,
  • Apply a security mindset to your daily work.

Gain expertise--and show it with this certificate and digital badge

As cybercrime threats grow, it's essential for financial professionals to understanding what the risks are and how mitigate or manage them.

This interactive, self-paced certificate program, authored by cybersecurity expert Chris Romeo, will help you acquire these skills so you can:

  • Add value to your organization
  • Create opportunities for your career growth
  • Consider exploring cybersecurity advisory as a specialization for yourself or your firm

Who Will Benefit?

  • Finance professionals
  • CFOs and business managers
  • Controllers and internal auditors
  • Management and public accountants

Key Topics

  • Cybersecurity terminology and digital transformation
  • Attacks and the security mindset
  • Data breaches and privacy
  • Cybersecurity frameworks including NIST CSF
  • Elements of a cybersecurity risk management program
  • Benefits of investing in cybersecurity
  • Options for cybersecurity service offerings

Learning Objectives

  • Recognize the impact of digital transformation on business.
  • Recognize key cybersecurity terms and what it takes to have a security mindset.
  • Recognize the threat landscape and the importance of security to various technologies.
  • Recognize how a data breach occurs and the organizational impact.
  • Recognize the impact to the organization when privacy is compromised.
  • Recognize the definition and purpose of a cybersecurity risk management program and description criteria.
  • Identify which security framework(s) would be best for your organization or client.
  • Identify the five functions described in the core of the NIST Cybersecurity Framework (CSF).

Credit Info

  • CPE CREDITS: Online: 15.5 (CPE credit info)
  • NASBA FIELD OF STUDY: Information Technology
  • LEVEL: Basic
  • PREREQUISITES: None
  • ADVANCE PREPARATION: None
  • DELIVERY METHOD: QAS Self-Study
  • COURSE ACRONYM: CSFD

Online Access Instructions

A personal pin code is enclosed in the physical packaging that may be act


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия