1. Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet
    Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet Anna Thygesen
    4.3
  2. På grænsen
    På grænsen Søren Baastrup
    4.6
  3. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  4. Permanent Record: A Memoir of a Reluctant Whistleblower
    Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  5. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  6. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  7. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  8. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
  9. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
  10. Ömers Team: Gefährliche Schatten im Feriencamp
    Ömers Team: Gefährliche Schatten im Feriencamp Stefan Lehrner
  11. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
  12. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
  13. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  14. The Shocking Truth about Financial Scams
    The Shocking Truth about Financial Scams Zoey Fraisers
  15. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
  16. Hackeados: Los Secretos Detrás De Los Ciberataques
    Hackeados: Los Secretos Detrás De Los Ciberataques Jessica Barker
  17. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
    4
  18. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
  19. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
  20. GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte
    GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte StorySculptres Graf
  21. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
  22. Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen
    Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen Niels Sandøe
  23. Agents of Innocence: A Novel
    Agents of Innocence: A Novel David Ignatius
  24. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  25. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
  26. What the hack!
    What the hack! Maria Genova
  27. The Identity Theft Protection Guide
    The Identity Theft Protection Guide Amanda Welsh
  28. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
  29. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters
    Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
  30. Jack Porter - Freundschaft ohne Wiederkehr
    Jack Porter - Freundschaft ohne Wiederkehr Thoralf Schmidt
  31. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  32. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
  33. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
  34. أسرار الطلبة
    أسرار الطلبة محمد خضيري نعمان
    1
  35. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
  36. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
  37. Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt
    Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt Jana Ringwald
  38. Gehackt! - Een hack in Den Haag
    Gehackt! - Een hack in Den Haag Hans Klis
    4.5
  39. Gehackt! - Alles voor de Lulz
    Gehackt! - Alles voor de Lulz Hans Klis
    4.3
  40. Gehackt! - Stuxnet: een digitale atoombom
    Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  41. Gehackt! - De flappentap van Carbanak
    Gehackt! - De flappentap van Carbanak Hans Klis
    4.4
  42. Gehackt! - Diginotar: Nederland aan de rand van de afgrond
    Gehackt! - Diginotar: Nederland aan de rand van de afgrond Hans Klis
    4.3
  43. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
  44. Hacking Ético
    Hacking Ético Luis Herrero Pérez
  45. Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross
    Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross Worth Books
    4
  46. Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
    Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet Joe Tidy
  47. Stories of the Most Dangerous Cyber Manhunts in History
    Stories of the Most Dangerous Cyber Manhunts in History Waleed Saleh
  48. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4
  49. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief
    Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief Richard Marcus
  50. Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer
    Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer Denise Wallace