Koder og konspirationer

  1. Den ultimative hemmelighed
    Den ultimative hemmelighed Dan Brown
    3.8
  2. Engle & dæmoner
    Engle & dæmoner Dan Brown
    4.5
  3. Da Vinci mysteriet
    Da Vinci mysteriet Dan Brown
    4.6
  4. Svalens graf
    Svalens graf Sissel-Jo Gazan
    4.3
  5. Dinosaurens fjer
    Dinosaurens fjer Sissel-Jo Gazan
    4.2
  6. Enkernes land
    Enkernes land Jeanette Varberg
    4
  7. Min broders vogter
    Min broders vogter Leif Davidsen
    4.3
  8. Labyrint
    Labyrint Kate Mosse
    3.7
  9. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    3.8
  10. Libri di Luca
    Libri di Luca Mikkel Birkegaard
    4.1
  11. Rosenkoden
    Rosenkoden Kate Quinn
    4.5
  12. Rosens labyrint
    Rosens labyrint Titania Hardie
    3.3
  13. Dommens dag
    Dommens dag Jonathan Freedland
    4
  14. Frejas Blod - Freja-trilogien I: Nordisk krimi
    Frejas Blod - Freja-trilogien I: Nordisk krimi Martin Holmslykke
    3.3
  15. Jagten på Nostradamus' forsvundne profetier
    Jagten på Nostradamus' forsvundne profetier Mario Reading
    3.8
  16. The Valley of Fear
    The Valley of Fear Arthur Conan Doyle
    4.2
  17. Voynich-manuskriptet
    Voynich-manuskriptet Marie Brinch
    4
  18. Hævnens alkymi
    Hævnens alkymi Kurt Aust
    3.7
  19. Lazaruseffekten
    Lazaruseffekten Tom Egeland
    3.9
  20. Den udvalgte
    Den udvalgte Jonathan Freedland
    3.9
  21. Det sidste testamente
    Det sidste testamente Jonathan Freedland
    3.7
  22. En andra allians
    En andra allians Denise Rudberg
    4.2
  23. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  24. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
  25. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
  26. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
  27. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
  28. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  29. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
  30. Occidentens stjerne
    Occidentens stjerne Benni Bødker
    3.1
  31. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
  32. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  33. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
  34. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  35. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  36. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
  37. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  38. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  39. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
  40. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
  41. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  42. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
  43. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
  44. Operation Rubicon - Århundredets største efterretningskup
    Operation Rubicon - Århundredets største efterretningskup Thomas Hee
    4.5
  45. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
  46. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  47. SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!"
    SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!" Kellan Briarwood
  48. Kickstart Quantum Computing and Communication Fundamentals
    Kickstart Quantum Computing and Communication Fundamentals Paras Barwal
  49. Building Decentralized Applications with Ethereum and Solidity
    Building Decentralized Applications with Ethereum and Solidity Shri Raghu Thiyagharajan
  50. Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!"
    Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!" Quentin Bellamy