Dataintegritet

  1. The Internet Con: How to Seize the Means of Computation
    The Internet Con: How to Seize the Means of Computation Cory Doctorow
    4.6
  2. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
    0
  3. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
    0
  4. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
    0
  5. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
    0
  6. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
    0
  7. Övervakningens historia
    Övervakningens historia Andreas Marklund
    3.8
  8. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
    0
  9. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    4
  10. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
    0
  11. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
    0
  12. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
    0
  13. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
    0
  14. Ultimate Web API Development with Django REST Framework
    Ultimate Web API Development with Django REST Framework Leonardo Lazzaro
    0
  15. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
    0
  16. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
    0
  17. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
    0
  18. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
    0
  19. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  20. CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!"
    CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!" Cedric Ashworth
    0
  21. CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!"
    CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!" Cyrus Pendleton
    0
  22. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
    0
  23. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
    0
  24. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
    0
  25. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
    Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
    0
  26. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
    0
  27. Darknet: A Beginner’s Guide On How To Stay Anonymous Online
    Darknet: A Beginner’s Guide On How To Stay Anonymous Online Lance Henderson
    0
  28. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
    0
  29. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
    0
  30. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    3.7
  31. The Shocking Truth about Digital Privacy
    The Shocking Truth about Digital Privacy Zoey Fraisers
    0
  32. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  33. Darknet: A Beginner`s Guide to Staying Anonymous Online
    Darknet: A Beginner`s Guide to Staying Anonymous Online Lance Henderson
    0
  34. Tor And The Dark Art Of Anonymity
    Tor And The Dark Art Of Anonymity Lance Henderson
    0
  35. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
    0
  36. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    4.5
  37. The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte
    The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte Jonathan Bier
    0
  38. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
    0
  39. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
    0
  40. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
    0
  41. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
    0
  42. The Shocking Truth about Online Privacy
    The Shocking Truth about Online Privacy Zoey Fraisers
    0
  43. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
    0
  44. The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era
    The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era Brian Gibson
    0
  45. SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!"
    SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!" Kellan Briarwood
    0
  46. Kickstart Quantum Computing and Communication Fundamentals
    Kickstart Quantum Computing and Communication Fundamentals Paras Barwal
    0
  47. Building Decentralized Applications with Ethereum and Solidity
    Building Decentralized Applications with Ethereum and Solidity Shri Raghu Thiyagharajan
    0
  48. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
    4
  49. Digital Insights: Exploring Privacy, Currency, and Technology's Reach (4 in 1)
    Digital Insights: Exploring Privacy, Currency, and Technology's Reach (4 in 1) Zoey Fraisers
    0
  50. Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!"
    Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!" Quentin Bellamy
    0