Glad to hear it. On Wed, Feb 20, 2013 at 1:09 PM, Ziots, Edward <[email protected]> wrote: > Kurt > > Thanks for the recommendation I just got my copy of the book and started to > read through, definitely good so far. > > Z > > Edward E. Ziots, CISSP, Security +, Network + > Security Engineer > Lifespan Organization > [email protected] > > This electronic message and any attachments may be privileged and > confidential and protected from disclosure. If you are reading this message, > but are not the intended recipient, nor an employee or agent responsible for > delivering this message to the intended recipient, you are hereby notified > that you are strictly prohibited from copying, printing, forwarding or > otherwise disseminating this communication. If you have received this > communication in error, please immediately notify the sender by replying to > the message. Then, delete the message from your computer. Thank you. > > > > > -----Original Message----- > From: Kurt Buff [mailto:[email protected]] > Sent: Thursday, February 07, 2013 5:20 PM > To: NT System Admin Issues > Subject: Highly recommended - I have a paper copy > > ---------- Forwarded message ---------- > From: InfoSec News <[email protected]> > Date: Wed, Feb 6, 2013 at 11:41 PM > Subject: [ISN] Security Engineering -- The Book - For Free! > To: [email protected] > > > http://www.cl.cam.ac.uk/~rja14/book.html > > Security Engineering -- The Book > > ‘I'm incredibly impressed that one person could produce such a thorough > coverage. Moreover, you make the stuff easy and enjoyable to read. I find it > just as entertaining - and far more useful - than novels (and my normal > science fiction). When I first got it in the mail, I said to myself "I'm > never going to read all of that." But once I started reading I just kept > going and going. Fantastic: well done. > Now, let's hope that all those in charge of security for information > technology will also read the book and heed the lessons.’ Don Norman > > ‘The book that you MUST READ RIGHT NOW is the second edition of Ross > Anderson's Security Engineering book. Ross did a complete pass on his classic > tome and somehow made it even better...’ Gary McGraw > > ‘It's beautiful. This is the best book on the topic there is’ > Bruce Schneier > > All chapters from the second edition now available free online! > > Table of contents > Preface > Acknowledgements > Chapter 1: What is Security Engineering? > Chapter 2: Usability and Psychology > Chapter 3: Protocols > Chapter 4: Access Control > Chapter 5: Cryptography > Chapter 6: Distributed Systems > Chapter 7: Economics > Chapter 8: Multilevel Security > Chapter 9: Multilateral Security > Chapter 10: Banking and Bookkeeping > Chapter 11: Physical Protection > Chapter 12: Monitoring and Metering > Chapter 13: Nuclear Command and Control > Chapter 14: Security Printing and Seals > Chapter 15: Biometrics > Chapter 16: Physical Tamper Resistance > Chapter 17: Emission Security > Chapter 18: API Security > Chapter 19: Electronic and Information Warfare Chapter 20: Telecom System > Security Chapter 21: Network Attack and Defence Chapter 22: Copyright and DRM > Chapter 23: The Bleeding Edge Chapter 24: Terror, Justice and Freedom Chapter > 25: Managing the Development of Secure Systems Chapter 26: System Evaluation > and Assurance Chapter 27: Conclusions Bibliography Index > > When I wrote the first edition, we put the chapters online free after four > years and found that this boosted sales of the paper edition. > People would find a useful chapter online and then buy the book to have it as > a reference. Wiley and I agreed to do the same with the second edition, and > now, four years after publication, I am putting all the chapters online for > free. Enjoy them – and I hope you'll buy the paper version to have as a > conveient shelf reference: > > Buy from Amazon.com > Buy from Wiley > Buy from Amazon.co.uk (Kindle version) > > Here are the errata for the second edition, and here's a page of notes and > links concerning relevant topics that I've come across since publication. > > Supplementary materials: If you're a college professor thinking of using my > book in class, note that we use my book in three courses at > Cambridge: > > * the first part in second-year Introduction to Security (course > material and past exam questions) > > * the second in third-year Security (course material and questions), and > > * the third part in our second-year Software Engineering (course, > questions and still more questions). > > I hope you find these useful. You're welcome to use and adapt any of my > slides if you wish under this Creative Commons license. Also, if you're an > instructor at an accredited institution, you can request an evaluation copy > via Wiley's website. > > > ______________________________________________ > Visit the InfoSec News Security Bookstore Best Selling Security Books and > More! > http://www.shopinfosecnews.org > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ > <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin
~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
