Cyber Crime by A. Grant-Adamson
Door Wilma Wiggins

1. Buried Deep Inside: A Novel of Cyber-Terror by Steve Mallard
1.1. Priority
1.2. Tasks
1.2.1. Task 1
1.2.2. Task 2
1.3. Phone Calls
1.3.1. Call 1
1.3.2. Call 2
1.4. Meetings
1.4.1. Meeting 1
1.4.2. Meeting 2
2. Cyber Reader: Critical Writings for the Digital Era by Neil Spiller
2.1. Priority
2.2. Tasks
2.2.1. Task 1
2.2.2. Task 2
2.3. Phone Calls
2.3.1. Call 1
2.3.2. Call 2
2.4. Meetings
2.4.1. Meeting 1
2.4.2. Meeting 2
3. The Sacred Protocol (Evilution) by Hylton Smith
4. Cyber-killers by Ric Alexander
4.1. Priority
4.2. Tasks
4.2.1. Task 1
4.2.2. Task 2
4.3. Phone Calls
4.3.1. Call 1
4.3.2. Call 2
4.4. Meetings
4.4.1. Meeting 1
4.4.2. Meeting 2
5. Cybernation (Tom Clancy's Net Force, Book 6) by Tom Clancy, Steve Pieczenik and Steve Perry
5.1. Priority
5.2. Tasks
5.2.1. Task 1
5.2.2. Task 2
5.3. Phone Calls
5.3.1. Call 1
5.3.2. Call 2
5.4. Meetings
5.4.1. Meeting 1
5.4.2. Meeting 2