Jaguar X-Type – 2001 to 2009


Book Description

Having this book in your pocket is just like having a real marque expert at your side. Benefit from Nigel Thorley's years of Jaguar experience, learn how to spot a bad car quickly, and how to assess a promising one like a true professional. Get the right car at the right price!




Consumer Reports Used Car Buying Guide [2005]


Book Description

Features recommendations and ratings on hundreds of small, medium, and large-sized cars based on quality, economy, performance, and comfort standards, with judgments on crash protection, and assessments of available options.




Consumer Reports Used Car Buying Guide 2003


Book Description

The ultimate used car guide lists the best and worst used cars, summarizes the marketplace, shares advice on web shopping, discusses author insurance, and shares tips on buying and selling. Original.




Autocar


Book Description




Road and Track


Book Description




Cars & Parts


Book Description







The Car Hacker's Handbook


Book Description

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.




Jaguar E-Type


Book Description

This book provides an insight into the background, development and features of Jaguar's iconic E-Type in both historic and modern day terms, and is beautifully illustrated with superb archive images and modern studio photography.




Class


Book Description

This book describes the living-room artifacts, clothing styles, and intellectual proclivities of American classes from top to bottom.