New chapter, and official cover PDF
This commit is contained in:
parent
2b81a8db9c
commit
453cd82682
|
@ -1,4 +1,4 @@
|
||||||
# security-engineering-3rd-edition-ebook ![](https://img.shields.io/badge/Chapters%20Published-24%2F26-brightgreen)
|
# security-engineering-3rd-edition-ebook ![](https://img.shields.io/badge/Chapters%20Published-25%2F26-brightgreen)
|
||||||
|
|
||||||
![third-edition-security-engineering-book-cover](cover-thumb.jpg)
|
![third-edition-security-engineering-book-cover](cover-thumb.jpg)
|
||||||
|
|
||||||
|
@ -36,7 +36,8 @@ See `titles.txt` for the bookmark titles used by the script.
|
||||||
- Chapter 21: Network Attack and Defence
|
- Chapter 21: Network Attack and Defence
|
||||||
- Chapter 22: Phones
|
- Chapter 22: Phones
|
||||||
- Chapter 23: Electronic and Information Warfare
|
- Chapter 23: Electronic and Information Warfare
|
||||||
- Chapter 26: Surveillance or Privacy?
|
- Chapter 25: Surveillance or Privacy?
|
||||||
|
- Chapter 26: Managing the Development of Secure Systems
|
||||||
- Bibliography
|
- Bibliography
|
||||||
|
|
||||||
## How to generate the book?
|
## How to generate the book?
|
||||||
|
@ -72,8 +73,7 @@ This also requires `qpdf` to be installed.
|
||||||
|
|
||||||
`--download-cover-image`
|
`--download-cover-image`
|
||||||
|
|
||||||
Download the cover image. The repo already has a `cover.pdf` file which is used by default. This option will download the cover image and convert
|
Download the cover image. The repo already has [a `cover.pdf` file which](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.pdf) is used by default. Do this if the cover URL changes. Requires `wget` to be installed.
|
||||||
it to `pdf` yet again. Do this if the cover URL changes. Requires `imagemagick` to be installed.
|
|
||||||
|
|
||||||
## Support the Authors
|
## Support the Authors
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
COVER_URL=https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.jpg
|
COVER_URL=https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.pdf
|
||||||
FINAL_PDF=security-engineering-3rd-edition.pdf
|
FINAL_PDF=security-engineering-3rd-edition.pdf
|
||||||
INPUT_FILE="urls.txt"
|
INPUT_FILE="urls.txt"
|
||||||
|
|
||||||
|
@ -18,9 +18,8 @@ assert_installed wget pdftk
|
||||||
if [[ $@ == *'--download-cover-image'* ]]; then
|
if [[ $@ == *'--download-cover-image'* ]]; then
|
||||||
echo "Downloading cover image"
|
echo "Downloading cover image"
|
||||||
assert_installed convert
|
assert_installed convert
|
||||||
wget --quiet --timestamping "$COVER_URL" --output-document cover.jpg
|
wget --quiet --timestamping "$COVER_URL" --output-document cover.pdf
|
||||||
convert cover.jpg cover.pdf
|
echo "Cover Image downloaded"
|
||||||
echo "Cover Image downloaded and converted to pdf"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
declare -a FILES_LIST
|
declare -a FILES_LIST
|
||||||
|
|
8
meta.txt
8
meta.txt
|
@ -105,10 +105,14 @@ BookmarkTitle: 23. Electronic and Information Warfare
|
||||||
BookmarkLevel: 1
|
BookmarkLevel: 1
|
||||||
BookmarkPageNumber: 656
|
BookmarkPageNumber: 656
|
||||||
BookmarkBegin
|
BookmarkBegin
|
||||||
BookmarkTitle: 26. Surveillance or Privacy?
|
BookmarkTitle: 25. Surveillance or Privacy?
|
||||||
BookmarkLevel: 1
|
BookmarkLevel: 1
|
||||||
BookmarkPageNumber: 689
|
BookmarkPageNumber: 689
|
||||||
BookmarkBegin
|
BookmarkBegin
|
||||||
|
BookmarkTitle: 26. Managing the Development of Secure Systems
|
||||||
|
BookmarkLevel: 1
|
||||||
|
BookmarkPageNumber: 737
|
||||||
|
BookmarkBegin
|
||||||
BookmarkTitle: Bibliography
|
BookmarkTitle: Bibliography
|
||||||
BookmarkLevel: 1
|
BookmarkLevel: 1
|
||||||
BookmarkPageNumber: 736
|
BookmarkPageNumber: 779
|
||||||
|
|
|
@ -22,5 +22,6 @@ Preface
|
||||||
21. Network Attack and Defence
|
21. Network Attack and Defence
|
||||||
22. Phones
|
22. Phones
|
||||||
23. Electronic and Information Warfare
|
23. Electronic and Information Warfare
|
||||||
26. Surveillance or Privacy?
|
25. Surveillance or Privacy?
|
||||||
|
26. Managing the Development of Secure Systems
|
||||||
Bibliography
|
Bibliography
|
||||||
|
|
3
urls.txt
3
urls.txt
|
@ -22,5 +22,6 @@ https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch20-feb28.pdf
|
||||||
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch21-mar17.pdf
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch21-mar17.pdf
|
||||||
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch22-3jun.pdf
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch22-3jun.pdf
|
||||||
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch23-may22.pdf
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch23-may22.pdf
|
||||||
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch26-dec18.pdf
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch25-jul10.pdf
|
||||||
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch26-jul10.pdf
|
||||||
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-bib-jan7.pdf
|
https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-bib-jan7.pdf
|
||||||
|
|
Loading…
Reference in New Issue