It-brott

  1. Cicada 3301: internets största mysterium
    Cicada 3301: internets största mysterium Jonathan Lundberg
    4.3
  2. Sprängdåd
    Sprängdåd Susan Casserfelt
    4
  3. Okänd avsändare
    Okänd avsändare Susan Casserfelt
    4
  4. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
    0
  5. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  6. Blue Nowhere
    Blue Nowhere Jeffery Deaver
    3.6
  7. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
    0
  8. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  9. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
    0
  10. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
    0
  11. Ömers Team: Gefährliche Schatten im Feriencamp
    Ömers Team: Gefährliche Schatten im Feriencamp Stefan Lehrner
    0
  12. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
    0
  13. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
    0
  14. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
    0
  15. The Shocking Truth about Financial Scams
    The Shocking Truth about Financial Scams Zoey Fraisers
    0
  16. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
    0
  17. Hackeados: Los Secretos Detrás De Los Ciberataques
    Hackeados: Los Secretos Detrás De Los Ciberataques Jessica Barker
    0
  18. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
    4
  19. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
    0
  20. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
    0
  21. GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte
    GTA 6: Der Teenager-Hack, der die Gaming-Welt erschütterte StorySculptres Graf
    0
  22. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
    0
  23. Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen
    Rede penge: Sådan blev Danmark hjem for ­momskarruseller, fakturafabrikker og ­organiseret svindel i milliardklassen Niels Sandøe
    0
  24. Hotelli Kalifornia
    Hotelli Kalifornia Kirsi Merimaa
    3.5
  25. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  26. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
    0
  27. What the hack!
    What the hack! Maria Genova
    0
  28. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
    0
  29. Преступная сеть
    Преступная сеть Джефф Уайт
    0
  30. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters
    Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
    0
  31. Jack Porter - Freundschaft ohne Wiederkehr
    Jack Porter - Freundschaft ohne Wiederkehr Thoralf Schmidt
    0
  32. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  33. Verkkorikokset
    Verkkorikokset Ari Haasio
    3.3
  34. Kuollut piste
    Kuollut piste Kirsi Merimaa
    3.6
  35. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
    0
  36. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
    0
  37. أسرار الطلبة
    أسرار الطلبة محمد خضيري نعمان
    1
  38. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
    0
  39. Roadside Crosses: A Kathryn Dance Novel
    Roadside Crosses: A Kathryn Dance Novel Jeffery Deaver
    4.2
  40. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
    0
  41. Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt
    Digital. Kriminell. Menschlich.: Eine Cyberstaatsanwältin ermittelt Jana Ringwald
    0
  42. Gehackt! - Een hack in Den Haag
    Gehackt! - Een hack in Den Haag Hans Klis
    4.5
  43. Gehackt! - Alles voor de Lulz
    Gehackt! - Alles voor de Lulz Hans Klis
    4.3
  44. Gehackt! - Stuxnet: een digitale atoombom
    Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  45. Gehackt! - De flappentap van Carbanak
    Gehackt! - De flappentap van Carbanak Hans Klis
    4.4
  46. Gehackt! - Diginotar: Nederland aan de rand van de afgrond
    Gehackt! - Diginotar: Nederland aan de rand van de afgrond Hans Klis
    4.3
  47. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
    0
  48. Hacking Ético
    Hacking Ético Luis Herrero Pérez
    0
  49. Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet
    Det er Christian fra banken: En bog til dig, der tror, du er for klog til at blive svindlet Anna Thygesen
    4.3
  50. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4