Open INIT6Source opened 1 year ago
[ ] - Coleman, E. (2012). Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press.
[ ] - datagram. (2011, August 5). Introduction To Tamper Evident Devices. Las Vegas, NV. Retrieved March 08, 2021, from https://www.youtube.com/watch?v=W07ZpEv9Sog
[ ] - Douglas, T. (2002). Hacker Culture. Minneapolis, MN: University of Minnesota Press. Retrieved March 06, 2021
[ ] - Holt, T., Bossler, A., & Seigfried-Spellar, K. (2018). Cybercrime and Digital Forensics. Routledge. Retrieved March 07, 2021
[ ] - Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review, 46, 757-780. Retrieved March 01, 2021, from https://journals.sagepub.com/doi/10.1111/1467-954X.00139
[ ] - Meyer, G. (1989). The Social Organization of the Computer Underground. Master's Thesis, Northern Illinois University. Retrieved March 06, 2021, from http://aom.jku.at/archiv/cmc/text/meyer_89.pdf
[ ] - Taylor, P. (1999). Hackers: Crime in the Digital Sublime. London: Routledge. Retrieved March 06, 2021
[ ] - Steinmetz, K. (2015, January). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1), 125-145. Retrieved March 06, 2021, from https://academic.oup.com/bjc/article/55/1/125/461098?login=true
[ ] - Wang, W. (2006). Steal This Computer Book 4.0: What They Won't Tell You About the Internet. Boston, MA: No Starch Press.
HaRT-loading
Users/Tools