Data privacy

  1. Dit wil je écht niet weten: Over de onvoorstelbare wereld achter je scherm
    Dit wil je écht niet weten: Over de onvoorstelbare wereld achter je scherm Huib Modderkolk
    4.6
  2. Hij volgt je
    Hij volgt je Corine Hartman
    4.3
  3. Het is oorlog maar niemand die het ziet
    Het is oorlog maar niemand die het ziet Huib Modderkolk
    4.6
  4. Supremacy: Winner of the FT Business Book of the Year 2024
    Supremacy: Winner of the FT Business Book of the Year 2024 Parmy Olson
    4.4
  5. Permanent Record: A Memoir of a Reluctant Whistleblower
    Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  6. Hackers: Over de vrijheidsstrijders van het internet
    Hackers: Over de vrijheidsstrijders van het internet Gerard Janssen
    4.6
  7. Pegasus: The Story of the World's Most Dangerous Spyware
    Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    4.4
  8. De Cirkel
    De Cirkel Dave Eggers
    3.8
  9. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  10. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
  11. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
  12. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
  13. The Resistance: Digital dissent in the age of machines
    The Resistance: Digital dissent in the age of machines Joel Achenbach
  14. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
  15. Övervakningens historia
    Övervakningens historia Andreas Marklund
    3.8
  16. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  17. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    4
  18. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
  19. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
  20. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  21. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  22. Ultimate Web API Development with Django REST Framework
    Ultimate Web API Development with Django REST Framework Leonardo Lazzaro
  23. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
  24. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  25. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  26. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
  27. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  28. CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!"
    CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!" Cedric Ashworth
  29. CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!"
    CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!" Cyrus Pendleton
  30. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  31. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
  32. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
  33. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
    Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
  34. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  35. Darknet: A Beginner’s Guide On How To Stay Anonymous Online
    Darknet: A Beginner’s Guide On How To Stay Anonymous Online Lance Henderson
  36. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
  37. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
  38. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    4.4
  39. The Shocking Truth about Digital Privacy
    The Shocking Truth about Digital Privacy Zoey Fraisers
  40. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  41. Darknet: A Beginner`s Guide to Staying Anonymous Online
    Darknet: A Beginner`s Guide to Staying Anonymous Online Lance Henderson
  42. Tor And The Dark Art Of Anonymity
    Tor And The Dark Art Of Anonymity Lance Henderson
  43. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  44. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    5
  45. The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte
    The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte Jonathan Bier
  46. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
  47. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  48. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  49. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
  50. The Shocking Truth about Online Privacy
    The Shocking Truth about Online Privacy Zoey Fraisers