Киберпрестъпления

  1. Невромантик
    Невромантик Уилям Гибсън
    4.1
  2. Game On: Tempting Twenty-Eight
    Game On: Tempting Twenty-Eight Janet Evanovich
    4
  3. Dead at First Sight
    Dead at First Sight Peter James
    4.1
  4. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
    Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick
    4.6
  5. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  6. Open Secrecy: How Technology Empowers the Digital Underworld
    Open Secrecy: How Technology Empowers the Digital Underworld Isak Ladegaard
    5
  7. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  8. Template - Layers of deceit: Layers of deceit
    Template - Layers of deceit: Layers of deceit van Hattem Michiel
  9. Template: Breaking reality
    Template: Breaking reality Michiel van Hattem
  10. Cracking the Code of Computer Crimes
    Cracking the Code of Computer Crimes Abhisyanta Bharadwaj
  11. Digital Forensics and Cybercrime Explained
    Digital Forensics and Cybercrime Explained Kanti Shukla
  12. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  13. Mona Lisa Overdrive
    Mona Lisa Overdrive William Gibson
    5
  14. The Shocking Truth about Financial Scams
    The Shocking Truth about Financial Scams Zoey Fraisers
  15. Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1)
    Global Affairs: The Interconnected World and the Forces Shaping Our Future (3 in 1) Marcus Kline
  16. Hackeados: Los Secretos Detrás De Los Ciberataques
    Hackeados: Los Secretos Detrás De Los Ciberataques Jessica Barker
  17. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
  18. Advanced Cybersecurity: Defending Against Modern Threats
    Advanced Cybersecurity: Defending Against Modern Threats Craig Dames
  19. Data Privacy and Protection: Safeguarding Personal Information
    Data Privacy and Protection: Safeguarding Personal Information Craig Dames
  20. The Digital Economy: New Business Landscapes
    The Digital Economy: New Business Landscapes Craig Dames
  21. Agents of Innocence: A Novel
    Agents of Innocence: A Novel David Ignatius
  22. Trial By Fire: A Novel of Suspense
    Trial By Fire: A Novel of Suspense J.A. Jance
    3.6
  23. Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity
    Tor And The Deep Web Bundle: Master The Dark Art Of Anonymity Lance Henderson
  24. What the hack!
    What the hack! Maria Genova
  25. The Identity Theft Protection Guide
    The Identity Theft Protection Guide Amanda Welsh
  26. Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire
    Cryptomania: Hype, Hope, and the Fall of FTX's Billion-Dollar Fintech Empire Andrew R Chow
  27. Преступная сеть
    Преступная сеть Джефф Уайт
  28. Dark Web Intelligence and OSINT Techniques
    Dark Web Intelligence and OSINT Techniques Azhar ul Haque Sario
  29. Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation
    Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation Kurtis Minder
  30. Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction
    Don't Be Alone Anymore. Find New Friends despite Stress & too much Work: Incl. Bonus – Overcome fears, use social networks & digital communication, self-love as ways to happiness & attraction Simone Janson
  31. Onlife Criminology: Virtual Crimes and Real Harms
    Onlife Criminology: Virtual Crimes and Real Harms Janos Mark Szakolczai
  32. Gehackt! - Een hack in Den Haag
    Gehackt! - Een hack in Den Haag Hans Klis
    4.5
  33. Gehackt! - Alles voor de Lulz
    Gehackt! - Alles voor de Lulz Hans Klis
    4.3
  34. Gehackt! - Stuxnet: een digitale atoombom
    Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  35. Gehackt! - De flappentap van Carbanak
    Gehackt! - De flappentap van Carbanak Hans Klis
    4.4
  36. Gehackt! - Diginotar: Nederland aan de rand van de afgrond
    Gehackt! - Diginotar: Nederland aan de rand van de afgrond Hans Klis
    4.3
  37. Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs)
    Age of Deception: Cybersecurity as Secret Statecraft (Cornell Studies in Security Affairs) Jon R. Lindsay
  38. Hacking Ético
    Hacking Ético Luis Herrero Pérez
  39. Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
    Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan Worth Books
  40. Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross
    Summary and Analysis of The Industries of the Future: Based on the Book by Alec Ross Worth Books
    4
  41. Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet
    Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet Joe Tidy
  42. Stories of the Most Dangerous Cyber Manhunts in History
    Stories of the Most Dangerous Cyber Manhunts in History Waleed Saleh
  43. Too Pretty to Live: The Catfishing Murders of East Tennessee
    Too Pretty to Live: The Catfishing Murders of East Tennessee Dennis Brooks
    3.5
  44. Worm: The First Digital World War
    Worm: The First Digital World War Mark Bowden
  45. The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin
    The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Eileen Ormsby
    4
  46. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief
    Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief Richard Marcus
  47. Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer
    Women Crime Writers Volume Two: You Have a Very Soft Voice, Susan; Daddy's Little Secret; My Son, The Killer Denise Wallace
  48. You Have a Very Soft Voice, Susan: A Shocking True Story of Internet Stalking
    You Have a Very Soft Voice, Susan: A Shocking True Story of Internet Stalking Susan Fensten
  49. Fatal Error: A Novel
    Fatal Error: A Novel J.A. Jance
    3.5
  50. Locked Up: Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Response
    Locked Up: Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Response Zachary Lewis