Koder og konspirationer

  1. Engle & dæmoner
    Engle & dæmoner Dan Brown
    4.5
  2. Svalens graf
    Svalens graf Sissel-Jo Gazan
    4.3
  3. Da Vinci mysteriet
    Da Vinci mysteriet Dan Brown
    4.6
  4. Dinosaurens fjer
    Dinosaurens fjer Sissel-Jo Gazan
    4.2
  5. Enkernes land
    Enkernes land Jeanette Varberg
    4
  6. Rosenkoden
    Rosenkoden Kate Quinn
    4.5
  7. Min broders vogter
    Min broders vogter Leif Davidsen
    4.3
  8. Labyrint
    Labyrint Kate Mosse
    3.7
  9. Jagten på Nostradamus' forsvundne profetier
    Jagten på Nostradamus' forsvundne profetier Mario Reading
    3.8
  10. Operation Rubicon - Århundredets største efterretningskup
    Operation Rubicon - Århundredets største efterretningskup Thomas Hee
    4.5
  11. Libri di Luca
    Libri di Luca Mikkel Birkegaard
    4.1
  12. Rosens labyrint
    Rosens labyrint Titania Hardie
    3.3
  13. Hævnens alkymi
    Hævnens alkymi Kurt Aust
    3.7
  14. Engleriget - Angelopolis
    Engleriget - Angelopolis Danielle Trussoni
    4
  15. Det sidste testamente
    Det sidste testamente Jonathan Freedland
    3.7
  16. Dommens dag
    Dommens dag Jonathan Freedland
    4
  17. Englen - Angelologi
    Englen - Angelologi Danielle Trussoni
    3.7
  18. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  19. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
  20. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
  21. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
  22. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
  23. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  24. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
  25. Occidentens stjerne
    Occidentens stjerne Benni Bødker
    3.1
  26. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
  27. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  28. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
  29. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  30. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  31. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
  32. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  33. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  34. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
  35. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
  36. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  37. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
  38. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
  39. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    4.4
  40. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
  41. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  42. SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!"
    SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!" Kellan Briarwood
  43. Kickstart Quantum Computing and Communication Fundamentals
    Kickstart Quantum Computing and Communication Fundamentals Paras Barwal
  44. Building Decentralized Applications with Ethereum and Solidity
    Building Decentralized Applications with Ethereum and Solidity Shri Raghu Thiyagharajan
  45. Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!"
    Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!" Quentin Bellamy
  46. Blockchain Basics: A Beginner's Guide to Distributed Ledger Technology
    Blockchain Basics: A Beginner's Guide to Distributed Ledger Technology Craig Dames
  47. Data Encryption for Beginners: A Simple Guide to Understanding and Implementing Encryption Technique
    Data Encryption for Beginners: A Simple Guide to Understanding and Implementing Encryption Technique Mark Jackson
  48. Bitcoin: Caos y Oportunidad
    Bitcoin: Caos y Oportunidad Santiago Machain
  49. Blockchain and Cryptocurrency for Beginners: A Beginner's Guide to the Future of Digital Finance. Part 2
    Blockchain and Cryptocurrency for Beginners: A Beginner's Guide to the Future of Digital Finance. Part 2 Simon Winston
  50. Blockchain and Cryptocurrency for Beginners: A Beginner's Guide to the Future of Digital Finance. Part 1
    Blockchain and Cryptocurrency for Beginners: A Beginner's Guide to the Future of Digital Finance. Part 1 Simon Winston