Glad to hear it.

On Wed, Feb 20, 2013 at 1:09 PM, Ziots, Edward <[email protected]> wrote:
> Kurt
>
> Thanks for the recommendation I just got my copy of the book and started to 
> read through, definitely good so far.
>
> Z
>
> Edward E. Ziots, CISSP, Security +, Network +
> Security Engineer
> Lifespan Organization
> [email protected]
>
> This electronic message and any attachments may be privileged and 
> confidential and protected from disclosure. If you are reading this message, 
> but are not the intended recipient, nor an employee or agent responsible for 
> delivering this message to the intended recipient, you are hereby notified 
> that you are strictly prohibited from copying, printing, forwarding or 
> otherwise disseminating this communication. If you have received this 
> communication in error, please immediately notify the sender by replying to 
> the message. Then, delete the message from your computer. Thank you.
>
>
>
>
> -----Original Message-----
> From: Kurt Buff [mailto:[email protected]]
> Sent: Thursday, February 07, 2013 5:20 PM
> To: NT System Admin Issues
> Subject: Highly recommended - I have a paper copy
>
> ---------- Forwarded message ----------
> From: InfoSec News <[email protected]>
> Date: Wed, Feb 6, 2013 at 11:41 PM
> Subject: [ISN] Security Engineering -- The Book - For Free!
> To: [email protected]
>
>
> http://www.cl.cam.ac.uk/~rja14/book.html
>
> Security Engineering -- The Book
>
> ‘I'm incredibly impressed that one person could produce such a thorough 
> coverage. Moreover, you make the stuff easy and enjoyable to read. I find it 
> just as entertaining - and far more useful - than novels (and my normal 
> science fiction). When I first got it in the mail, I said to myself "I'm 
> never going to read all of that." But once I started reading I just kept 
> going and going. Fantastic: well done.
> Now, let's hope that all those in charge of security for information 
> technology will also read the book and heed the lessons.’ Don Norman
>
> ‘The book that you MUST READ RIGHT NOW is the second edition of Ross 
> Anderson's Security Engineering book. Ross did a complete pass on his classic 
> tome and somehow made it even better...’ Gary McGraw
>
> ‘It's beautiful. This is the best book on the topic there is’
> Bruce Schneier
>
> All chapters from the second edition now available free online!
>
> Table of contents
> Preface
> Acknowledgements
> Chapter 1: What is Security Engineering?
> Chapter 2: Usability and Psychology
> Chapter 3: Protocols
> Chapter 4: Access Control
> Chapter 5: Cryptography
> Chapter 6: Distributed Systems
> Chapter 7: Economics
> Chapter 8: Multilevel Security
> Chapter 9: Multilateral Security
> Chapter 10: Banking and Bookkeeping
> Chapter 11: Physical Protection
> Chapter 12: Monitoring and Metering
> Chapter 13: Nuclear Command and Control
> Chapter 14: Security Printing and Seals
> Chapter 15: Biometrics
> Chapter 16: Physical Tamper Resistance
> Chapter 17: Emission Security
> Chapter 18: API Security
> Chapter 19: Electronic and Information Warfare Chapter 20: Telecom System 
> Security Chapter 21: Network Attack and Defence Chapter 22: Copyright and DRM 
> Chapter 23: The Bleeding Edge Chapter 24: Terror, Justice and Freedom Chapter 
> 25: Managing the Development of Secure Systems Chapter 26: System Evaluation 
> and Assurance Chapter 27: Conclusions Bibliography Index
>
> When I wrote the first edition, we put the chapters online free after four 
> years and found that this boosted sales of the paper edition.
> People would find a useful chapter online and then buy the book to have it as 
> a reference. Wiley and I agreed to do the same with the second edition, and 
> now, four years after publication, I am putting all the chapters online for 
> free. Enjoy them – and I hope you'll buy the paper version to have as a 
> conveient shelf reference:
>
> Buy from Amazon.com
> Buy from Wiley
> Buy from Amazon.co.uk (Kindle version)
>
> Here are the errata for the second edition, and here's a page of notes and 
> links concerning relevant topics that I've come across since publication.
>
> Supplementary materials: If you're a college professor thinking of using my 
> book in class, note that we use my book in three courses at
> Cambridge:
>
> * the first part in second-year Introduction to Security (course
>   material and past exam questions)
>
> * the second in third-year Security (course material and questions), and
>
> * the third part in our second-year Software Engineering (course,
>   questions and still more questions).
>
> I hope you find these useful. You're welcome to use and adapt any of my 
> slides if you wish under this Creative Commons license. Also, if you're an 
> instructor at an accredited institution, you can request an evaluation copy 
> via Wiley's website.
>
>
> ______________________________________________
> Visit the InfoSec News Security Bookstore Best Selling Security Books and 
> More!
> http://www.shopinfosecnews.org
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
> <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here: 
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here: 
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to