Data privacy

  1. There's No Such Thing as Crypto Crime: An Investigative Handbook
    There's No Such Thing as Crypto Crime: An Investigative Handbook Nick Furneaux
  2. CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!"
    CISSP Skills Unleashed: Elevate Your Cybersecurity Knowledge Instantly: "Transform your CISSP study experience—access captivating audio lessons made for swift knowledge enhancement!" Ronan Ashcombe
  3. Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes
    Dr Bitcoin: Toda la Magia que Esconde el Fascinante Mundo del Blockchain, Bitcoin y Demás Criptomonedas Para Principiantes Brian Alba
  4. The Rise Of Central Bank Digital Currencies (Cbdcs)
    The Rise Of Central Bank Digital Currencies (Cbdcs) AHMED MUSA
  5. The Resistance: Digital dissent in the age of machines
    The Resistance: Digital dissent in the age of machines Joel Achenbach
  6. CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery."
    CISSP Secrets Exposed: Transform Your Journey to Cybersecurity Mastery: "Elevate your Cybersecurity Journey! Unleash potent audio lessons for unmatched CISSP exam mastery." Talon Ashbury
  7. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats
    Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
  8. Cyber Privacy: Who Has Your Data and Why You Should Care
    Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    4
  9. Cryptocurrency 2025: Navigating the Blockchain Revolution
    Cryptocurrency 2025: Navigating the Blockchain Revolution Lionel Voss
  10. CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!"
    CSYA+ Secrets Revealed: Transform Your Cybersecurity Skills Effortlessly: "Unlock your cybersecurity potential! Dive into powerful audio lessons for unparalleled skill advancement!" Silas Langley
  11. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  12. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  13. Ultimate Web API Development with Django REST Framework
    Ultimate Web API Development with Django REST Framework Leonardo Lazzaro
  14. Crypto Revolution: Unraveling the Future of Global Finance
    Crypto Revolution: Unraveling the Future of Global Finance Orion Ledger
  15. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  16. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  17. Cybersecurity and Privacy Law Introduction
    Cybersecurity and Privacy Law Introduction ConvoCourses
  18. Bitcoin: Invest In Digital Gold
    Bitcoin: Invest In Digital Gold Szabolcs Juhasz
    5
  19. CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!"
    CISSP SIMPLIFIED: Secrets to Effortless Cybersecurity Success Unveiled: "Unlock your cybersecurity potential! Dive into our dynamic audio lessons for CISSP success like never before!" Cedric Ashworth
  20. CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!"
    CISSP Simplified: Secrets to Effortlessly Master Security Certification: "Elevate your CISSP exam prep with dynamic audio lessons for unbeatable certification success!" Cyrus Pendleton
  21. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  22. Crypto Unveiled: Navigating the New Frontier of Digital Currency
    Crypto Unveiled: Navigating the New Frontier of Digital Currency Aurelius Cipher
  23. Hands-on Cryptography with Python
    Hands-on Cryptography with Python Md Rasid Ali
  24. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
    Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
  25. Space Piracy: Preparing for a Criminal Crisis in Orbit
    Space Piracy: Preparing for a Criminal Crisis in Orbit Hugh Taylor
  26. Darknet: A Beginner’s Guide On How To Stay Anonymous Online
    Darknet: A Beginner’s Guide On How To Stay Anonymous Online Lance Henderson
  27. The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age
    The Sable Audit: Chronicles of a Financial Cataclysm in the Digital Age Jonathan Smith
  28. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Ultimate Hyperledger Fabric for DeFi with Blockchain Shubham Jain
  29. The Bitcoin Standard: The Decentralized Alternative to Central Banking
    The Bitcoin Standard: The Decentralized Alternative to Central Banking Saifedean Ammous
    4.4
  30. The Shocking Truth about Digital Privacy
    The Shocking Truth about Digital Privacy Zoey Fraisers
  31. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  32. Darknet: A Beginner`s Guide to Staying Anonymous Online
    Darknet: A Beginner`s Guide to Staying Anonymous Online Lance Henderson
  33. Tor And The Dark Art Of Anonymity
    Tor And The Dark Art Of Anonymity Lance Henderson
  34. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  35. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    5
  36. The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte
    The Blocksize War: Der Kampf um die Kontrolle des Bitcoin-Protokolls – Wie ein Soft Fork die größte Kryptowährung der Welt vor der Zentralisierung bewahrte Jonathan Bier
  37. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
    Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Zhassulan Zhussupov
  38. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  39. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  40. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
  41. The Shocking Truth about Online Privacy
    The Shocking Truth about Online Privacy Zoey Fraisers
  42. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  43. The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era
    The Fall Of Homo Digitalis: Impersonal Intimacy And New Relationships in The Digital Era Brian Gibson
  44. SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!"
    SIE Strategies for Clear Success: "Elevate your SIE exam prep with dynamic audio lessons for unbeatable test success!" Kellan Briarwood
  45. Kickstart Quantum Computing and Communication Fundamentals
    Kickstart Quantum Computing and Communication Fundamentals Paras Barwal
  46. Building Decentralized Applications with Ethereum and Solidity
    Building Decentralized Applications with Ethereum and Solidity Shri Raghu Thiyagharajan
  47. Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers
    Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers Eric O'Neill
  48. Digital Insights: Exploring Privacy, Currency, and Technology's Reach (4 in 1)
    Digital Insights: Exploring Privacy, Currency, and Technology's Reach (4 in 1) Zoey Fraisers
  49. Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!"
    Transformative Insights for Effortless Mastery: "Elevate your mastery with captivating audio lessons for effortless learning and success!" Quentin Bellamy
  50. 5G Technology: Revolutionizing Connectivity
    5G Technology: Revolutionizing Connectivity Craig Dames