1. Usynlig fjende. Hackerangreb og hemmelige netværk
    Usynlig fjende. Hackerangreb og hemmelige netværk Ida Nyegård Espersen, Jan Kaastrup, Michael Sjøberg
    4.5
  2. Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet
    Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet Anna Thygesen
    4.3
  3. På grænsen
    På grænsen Søren Baastrup, Johnny Robin Jørgensen
    4.6
  4. Permanent Record: A Memoir of a Reluctant Whistleblower
    Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  5. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
    0
  6. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  7. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
    0
  8. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
    0
  9. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
    0
  10. Ömers Team: Gefährliche Schatten im Feriencamp
    Ömers Team: Gefährliche Schatten im Feriencamp Stefan Lehrner
    0
  11. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
    0
  12. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
    0
  13. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor, Marc Feldman
    0
  14. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  15. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
    0
  16. Hackeados: Los Secretos Detrás De Los Ciberataques
    Hackeados: Los Secretos Detrás De Los Ciberataques Jessica Barker
    0
  17. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
    4
  18. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
    0
  19. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
    0
  20. GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte
    GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte StorySculptres Graf
    0
  21. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
    0
  22. Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen
    Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen Niels Sandøe, Bo Elkjær
    0
  23. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  24. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
    0
  25. What the hack!
    What the hack! Maria Genova
    0
  26. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
    0
  27. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters
    Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
    0
  28. Jack Porter - Freundschaft ohne Wiederkehr
    Jack Porter - Freundschaft ohne Wiederkehr Thoralf Schmidt
    0
  29. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  30. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
    0
  31. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
    0
  32. أسرار الطلبة
    أسرار الطلبة محمد خضيري نعمان
    1
  33. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
    0
  34. Roadside Crosses: A Kathryn Dance Novel
    Roadside Crosses: A Kathryn Dance Novel Jeffery Deaver
    4.2
  35. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
    0
  36. Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt
    Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt Jana Ringwald
    0
  37. Gehackt! - Een hack in Den Haag
    Gehackt! - Een hack in Den Haag Hans Klis
    4.5
  38. Gehackt! - Alles voor de Lulz
    Gehackt! - Alles voor de Lulz Hans Klis
    4.3
  39. Gehackt! - Stuxnet: een digitale atoombom
    Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  40. Gehackt! - De flappentap van Carbanak
    Gehackt! - De flappentap van Carbanak Hans Klis
    4.4
  41. Gehackt! - Diginotar: Nederland aan de rand van de afgrond
    Gehackt! - Diginotar: Nederland aan de rand van de afgrond Hans Klis
    4.3
  42. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
    0
  43. Hacking Ético
    Hacking Ético Luis Herrero Pérez
    0
  44. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4
  45. Daemon
    Daemon Daniel Suarez
    0
  46. Freedom (TM)
    Freedom (TM) Daniel Suarez
    0
  47. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief
    Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief Richard Marcus, Glen Hastings
    0
  48. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
    Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Andy Greenberg
    0
  49. The Mastermind: Drugs. Empire. Murder. Betrayal.
    The Mastermind: Drugs. Empire. Murder. Betrayal. Evan Ratliff
    0
  50. Fatal Error: A Novel
    Fatal Error: A Novel J.A. Jance
    3.5