Dataintegritet

  1. The Art of Cyber Security: A practical guide to winning the war on cyber crime
    The Art of Cyber Security: A practical guide to winning the war on cyber crime Gary Hibberd
    0
  2. Locked Up: Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Response
    Locked Up: Cybersecurity Threat Mitigation Lessons from A Real-World LockBit Ransomware Response Zachary Lewis
    0
  3. Supremacy: Winner of the FT Business Book of the Year 2024
    Supremacy: Winner of the FT Business Book of the Year 2024 Parmy Olson
    4.5
  4. The Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher
    The Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher Dermot Turing
    4.4
  5. Dit wil je écht niet weten: Over de onvoorstelbare wereld achter je scherm
    Dit wil je écht niet weten: Over de onvoorstelbare wereld achter je scherm Huib Modderkolk
    4.6
  6. Permanent Record: A Memoir of a Reluctant Whistleblower
    Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4.5
  7. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
    0
  8. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
    0
  9. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
    0
  10. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
    0
  11. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
    0
  12. Övervakningens historia
    Övervakningens historia Andreas Marklund
    3.8
  13. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez, Ravikant Tiwari
    0
  14. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    4
  15. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
    0
  16. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
    0
  17. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
    0
  18. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
    0
  19. Ultimate Web API Development with Django REST Framework
    Ultimate Web API Development with Django REST Framework Leonardo Lazzaro
    0
  20. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
    0
  21. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
    0
  22. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
    0
  23. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
    0
  24. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  25. CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!"
    CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!" Cedric Ashworth
    0
  26. CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!"
    CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!" Cyrus Pendleton
    0
  27. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
    0
  28. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
    0
  29. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
    0
  30. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
    Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
    0
  31. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor, Marc Feldman
    0
  32. Darknet: A Beginner’s Guide On How To Stay Anonymous Online
    Darknet: A Beginner’s Guide On How To Stay Anonymous Online Lance Henderson
    0
  33. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
    0
  34. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
    0
  35. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    3.8
  36. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  37. Darknet: A Beginner`s Guide to Staying Anonymous Online
    Darknet: A Beginner`s Guide to Staying Anonymous Online Lance Henderson
    0
  38. Tor And The Dark Art Of Anonymity
    Tor And The Dark Art Of Anonymity Lance Henderson
    0
  39. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown, Ira Winkler, CISSP
    0
  40. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    4
  41. The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte
    The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte Jonathan Bier
    0
  42. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
    0
  43. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
    0
  44. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
    0
  45. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******, Shayne Kawalilak
    0
  46. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
    0
  47. The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era
    The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era Brian Gibson
    0
  48. SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!"
    SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!" Kellan Briarwood
    0
  49. Kickstart Quantum Computing and Communication Fundamentals
    Kickstart Quantum Computing and Communication Fundamentals Paras Barwal
    0
  50. Building Decentralized Applications with Ethereum and Solidity
    Building Decentralized Applications with Ethereum and Solidity Shri Raghu Thiyagharajan
    0