1. På grænsen
    På grænsen Søren Baastrup
    4.6
  2. Permanent Record: A Memoir of a Reluctant Whistleblower
    Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  3. Pegasus: The Story of the World's Most Dangerous Spyware
    Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    4.5
  4. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
    The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    4.6
  5. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  6. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  7. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  8. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
  9. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
  10. Ömers Team: Gefährliche Schatten im Feriencamp
    Ömers Team: Gefährliche Schatten im Feriencamp Stefan Lehrner
  11. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
  12. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
  13. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  14. The Shocking Truth about Financial Scams
    The Shocking Truth about Financial Scams Zoey Fraisers
  15. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
  16. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
  17. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
  18. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
  19. Drugs Unlimited: The Web Revolution That's Changing How the World Gets High
    Drugs Unlimited: The Web Revolution That's Changing How the World Gets High Mike Power
  20. GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte
    GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte StorySculptres Graf
  21. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
  22. Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen
    Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen Niels Sandøe
  23. Agents of Innocence: A Novel
    Agents of Innocence: A Novel David Ignatius
  24. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  25. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
  26. The Identity Theft Protection Guide
    The Identity Theft Protection Guide Amanda Welsh
  27. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
  28. Jack Porter - Freundschaft ohne Wiederkehr
    Jack Porter - Freundschaft ohne Wiederkehr Thoralf Schmidt
  29. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  30. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
  31. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
  32. أسرار الطلبة
    أسرار الطلبة محمد خضيري نعمان
    1
  33. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
  34. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
  35. Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt
    Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt Jana Ringwald
  36. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
  37. Hacking Ético
    Hacking Ético Luis Herrero Pérez
  38. Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
    Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan Worth Books
  39. Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross
    Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross Worth Books
    4
  40. Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
    Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet Joe Tidy
  41. Stories of the Most Dangerous Cyber Manhunts in History
    Stories of the Most Dangerous Cyber Manhunts in History Waleed Saleh
  42. Too Pretty to Live: The Catfishing Murders of East Tennessee
    Too Pretty to Live: The Catfishing Murders of East Tennessee Dennis Brooks
    3.5
  43. Worm: The First Digital World War
    Worm: The First Digital World War Mark Bowden
  44. Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet
    Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet Anna Thygesen
  45. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4
  46. Hidden
    Hidden Karen E. Olson
  47. Shadowed
    Shadowed Karen E. Olson
  48. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief
    Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief Richard Marcus
  49. Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer
    Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer Denise Wallace
  50. You Have a Very Soft Voice, Susan: A Shocking True Story of Internet Stalking
    You Have a Very Soft Voice, Susan: A Shocking True Story of Internet Stalking Susan Fensten