1. Usynlig fjende: Hackerangreb og hemmelige netværk
    Usynlig fjende: Hackerangreb og hemmelige netværk Ida Nyegård Espersen, Jan Kaastrup, Michael Sjøberg
    4.5
  2. Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet
    Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet Anna Thygesen
    4.3
  3. På grænsen
    På grænsen Søren Baastrup, Johnny Robin Jørgensen
    4.6
  4. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
    4
  5. Gray Day: My Undercover Mission to Expose America's First Cyber Spy
    Gray Day: My Undercover Mission to Expose America's First Cyber Spy Eric O'Neill
    0
  6. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    4.6
  7. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
    0
  8. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  9. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
    0
  10. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
    0
  11. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
    0
  12. Ömers Team: Gefährliche Schatten im Feriencamp
    Ömers Team: Gefährliche Schatten im Feriencamp Stefan Lehrner
    0
  13. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
    0
  14. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
    0
  15. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor, Marc Feldman
    0
  16. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  17. The Shocking Truth about Financial Scams
    The Shocking Truth about Financial Scams Zoey Fraisers
    0
  18. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
    0
  19. Hackeados: Los Secretos Detrás De Los Ciberataques
    Hackeados: Los Secretos Detrás De Los Ciberataques Jessica Barker
    0
  20. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
    0
  21. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
    0
  22. GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte
    GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte StorySculptres Graf
    0
  23. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
    0
  24. Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen
    Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen Niels Sandøe, Bo Elkjær
    0
  25. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  26. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
    0
  27. What the hack!
    What the hack! Maria Genova
    0
  28. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
    0
  29. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters
    Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
    0
  30. Jack Porter - Freundschaft ohne Wiederkehr
    Jack Porter - Freundschaft ohne Wiederkehr Thoralf Schmidt
    0
  31. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  32. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
    0
  33. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
    0
  34. أسرار الطلبة
    أسرار الطلبة محمد خضيري نعمان
    1
  35. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
    0
  36. Roadside Crosses: A Kathryn Dance Novel
    Roadside Crosses: A Kathryn Dance Novel Jeffery Deaver
    4.2
  37. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
    0
  38. Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt
    Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt Jana Ringwald
    0
  39. Gehackt! - Een hack in Den Haag
    Gehackt! - Een hack in Den Haag Hans Klis
    4.5
  40. Gehackt! - Alles voor de Lulz
    Gehackt! - Alles voor de Lulz Hans Klis
    4.3
  41. Gehackt! - Stuxnet: een digitale atoombom
    Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  42. Gehackt! - De flappentap van Carbanak
    Gehackt! - De flappentap van Carbanak Hans Klis
    4.4
  43. Gehackt! - Diginotar: Nederland aan de rand van de afgrond
    Gehackt! - Diginotar: Nederland aan de rand van de afgrond Hans Klis
    4.3
  44. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
    0
  45. Hacking Ético
    Hacking Ético Luis Herrero Pérez
    0
  46. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4
  47. Daemon
    Daemon Daniel Suarez
    0
  48. Freedom (TM)
    Freedom (TM) Daniel Suarez
    0
  49. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief
    Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief Richard Marcus, Glen Hastings
    0
  50. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
    Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Andy Greenberg
    0