AMATEURS HACK SYSTEM PROFESSIONALS HACK CARS
Abstract
Keywords
Full Text:
PDFReferences
References:
Hartmann, B., Doorley, S., & Klemmer, S. R. (2008). Hacking, mashing, gluing: Understanding opportunistic design. Pervasive Computing, IEEE, 7(3), 46-54.
Hartmann, B., Doorley, S., & Klemmer, S. R. (2008). Hacking, mashing, gluing: Understanding opportunistic design. Pervasive Computing, IEEE, 7(3), 46-54.
Tapscott, D., & Williams, A. D. (2007). Hack This Product, Please. The Business Week Wikinomics Series, Business Week, February, 23.
Long, J. (2011). No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress.
Beaver, K. (2012). Hacking for dummies. John Wiley & Sons.
Copyright (c) 2014 Amit Saini, Akansha Marwah
![Creative Commons License](http://licensebuttons.net/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org