Dataintegritet

  1. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  2. Övervakningens historia Andreas Marklund
    3.8
  3. Supremacy: Winner of the FT Business Book of the Year 2024 Parmy Olson
    4.5
  4. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
  5. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
  6. The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
  7. The Resistance: Digital dissent in the age of machines The Washington Post
  8. The Threatened Net: How the Web Became a Perilous Place The Washington Post
  9. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
  10. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  11. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    4
  12. Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
  13. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
  14. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  15. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  16. Ultimate Web API Development with Django REST Framework Leonardo Lazzaro
  17. Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
  18. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  19. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  20. Cybersecurity and Privacy Law Introduction ConvoCourses
  21. Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  22. CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!" Cedric Ashworth
  23. CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!" Cyrus Pendleton
  24. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  25. Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
  26. Hands-on Cryptography with Python Md Rasid Ali
  27. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
  28. Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  29. Darknet: A Beginner’s Guide On How To Stay Anonymous Online Lance Henderson
  30. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
  31. Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
  32. The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    5
  33. The Shocking Truth about Digital Privacy Zoey Fraisers
  34. Darknet: How To Stay Anonmyous Online Lance Henderson
  35. Tor And The Dark Art Of Anonymity Lance Henderson
  36. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
  37. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  38. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  39. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
  40. From Clicks to Consequences: Understanding and Preventing Cyber Risks at Work and Beyond Ionut Banbuleac
  41. The Shocking Truth about Online Privacy Zoey Fraisers
  42. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  43. The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era Brian Gibson
  44. Recruitingwissen für Jobsucher: incl. Bonus – Kriterien der Bewerberauswahl, Initiativbewerbung schreiben, Einstellungstests, Auswahlverfahren, Arbeitszeugnis, Online-Reputation, Jobinterview Simone Janson
  45. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Ben Malisow
  46. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  47. The Secret Sister: A compelling suspense novel about family and secrets M. M. DeLuca
    3.5
  48. Datenschutz im Krankenhaus Andrea Hauser
  49. Cyberstrike: DC James Barrington
    4.3
  50. The Decision to Attack: Military and Intelligence Cyber Decision-Making Aaron Franklin Brantly