Browse Source

Remove unused stuff

master
Nemo 5 months ago
parent
commit
cbcaf25af7
  1. 2
      README.md
  2. 31
      book.md
  3. BIN
      cover-thumb.jpg
  4. BIN
      cover.jpg
  5. 5
      generate.sh
  6. 134
      meta.txt

2
README.md

@ -2,7 +2,7 @@
*Update*: The website currently only has 7 sample chapters since the remaining were removed at the book's publication, so this downloads the remaining chapters via [The Web Archive](https://web.archive.org/).
![third-edition-security-engineering-book-cover](cover-thumb.jpg)
![third-edition-security-engineering-book-cover](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-coversmall.jpg)
This is just the script to generate a combined PDF from the draft chapters that were published for review. The script also takes care of putting in the right bookmarks for all the chapters in the generated PDF file using [pystitcher](https://pypi.org/project/pystitcher/).

31
book.md

@ -2,34 +2,65 @@ title: Security Engineering — Third Edition
author: Ross Anderson
[Cover](cover.pdf)
[Preface](SEv3-pref-May16.pdf)
[1. What is Security Engineering?](SEv3-ch1-7sep.pdf)
[2. Who is the Opponent?](SEv3-ch2-7sep.pdf)
[3. Psychology and Usability](SEv3-ch3-7sep.pdf)
[4. Protocols](SEv3-ch4-7sep.pdf)
[5. Cryptography](SEv3-ch5-7sep.pdf)
[6. Access Control](SEv3-ch6-7sep.pdf)
[7. Distributed Systems](SEv3-ch7-7sep.pdf)
[8. Economics](SEv3-ch8-7sep.pdf)
[9. Multilevel Security](SEv3-ch9-7sep.pdf)
[10. Boundaries](SEv3-ch10-7sep.pdf)
[11. Inference Control](SEv3-ch11-7sep.pdf)
[12. Banking and Bookkeeping](SEv3-ch12-7sep.pdf)
[13. Physical Protection](SEv3-ch13-7sep.pdf)
[14. Monitoring and Metering](SEv3-ch14-7sep.pdf)
[15. Nuclear Command and Control](SEv3-ch15-7sep.pdf)
[16. Security Printing and Seals](SEv3-ch16-7sep.pdf)
[17. Biometrics](SEv3-ch17-7sep.pdf)
[18. Physical Tamper Resistance](SEv3-ch18-7sep.pdf)
[19. Side Channels](SEv3-ch19-7sep.pdf)
[20. Advanced Cryptographic Engineering](SEv3-ch20-7sep.pdf)
[21. Network Attack and Defence](SEv3-ch21-7sep.pdf)
[22. Phones](SEv3-ch22-7sep.pdf)
[23. Electronic and Information Warfare](SEv3-ch23-7sep.pdf)
[24: Copyright and DRM](SEv3-ch24-7sep.pdf)
[25: Taking Stock](SEv3-ch25-7sep.pdf)
[26. Surveillance or Privacy?](SEv3-ch26-7sep.pdf)
[27. Secure Systems Development](SEv3-ch27-7sep.pdf)
[28. Assurance and Sustainability](SEv3-ch28-7sep.pdf)
[29. Beyond “Computer Says No”](SEv3-ch29-7sep.pdf)
[Bibliography](SEv3-bib-7sep.pdf)

BIN
cover-thumb.jpg

Binary file not shown.

Before

Width:  |  Height:  |  Size: 29 KiB

BIN
cover.jpg

Binary file not shown.

Before

Width:  |  Height:  |  Size: 318 KiB

5
generate.sh

@ -1,8 +1,5 @@
#!/bin/ash
set -euo pipefail
IFS=$'\n\t'
#!/bin/sh
COVER_URL=https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.pdf
FINAL_PDF=security-engineering-3rd-edition.pdf
INPUT_FILE="urls.txt"

134
meta.txt

@ -1,134 +0,0 @@
InfoBegin
InfoKey: Title
InfoValue: Security Engineering — Third Edition
InfoBegin
InfoKey: Author
InfoValue: Ross Anderson
BookmarkBegin
BookmarkTitle: Cover
BookmarkLevel: 1
BookmarkPageNumber: 1
BookmarkBegin
BookmarkTitle: Preface
BookmarkLevel: 1
BookmarkPageNumber: 2
BookmarkBegin
BookmarkTitle: 1. What is Security Engineering?
BookmarkLevel: 1
BookmarkPageNumber: 4
BookmarkBegin
BookmarkTitle: 2. Who is the Opponent?
BookmarkLevel: 1
BookmarkPageNumber: 17
BookmarkBegin
BookmarkTitle: 3. Psychology and Usability
BookmarkLevel: 1
BookmarkPageNumber: 57
BookmarkBegin
BookmarkTitle: 4. Protocols
BookmarkLevel: 1
BookmarkPageNumber: 107
BookmarkBegin
BookmarkTitle: 5. Cryptography
BookmarkLevel: 1
BookmarkPageNumber: 131
BookmarkBegin
BookmarkTitle: 6. Access Control
BookmarkLevel: 1
BookmarkPageNumber: 187
BookmarkBegin
BookmarkTitle: 7. Distributed Systems
BookmarkLevel: 1
BookmarkPageNumber: 218
BookmarkBegin
BookmarkTitle: 8. Economics
BookmarkLevel: 1
BookmarkPageNumber: 245
BookmarkBegin
BookmarkTitle: 9. Multilevel Security
BookmarkLevel: 1
BookmarkPageNumber: 279
BookmarkBegin
BookmarkTitle: 10. Boundaries
BookmarkLevel: 1
BookmarkPageNumber: 302
BookmarkBegin
BookmarkTitle: 11. Inference Control
BookmarkLevel: 1
BookmarkPageNumber: 331
BookmarkBegin
BookmarkTitle: 12. Banking and Bookkeeping
BookmarkLevel: 1
BookmarkPageNumber: 356
BookmarkBegin
BookmarkTitle: 13. Physical Protection
BookmarkLevel: 1
BookmarkPageNumber: 414
BookmarkBegin
BookmarkTitle: 14. Monitoring and Metering
BookmarkLevel: 1
BookmarkPageNumber: 437
BookmarkBegin
BookmarkTitle: 15. Nuclear Command and Control
BookmarkLevel: 1
BookmarkPageNumber: 465
BookmarkBegin
BookmarkTitle: 16. Security Printing and Seals
BookmarkLevel: 1
BookmarkPageNumber: 482
BookmarkBegin
BookmarkTitle: 17. Biometrics
BookmarkLevel: 1
BookmarkPageNumber: 502
BookmarkBegin
BookmarkTitle: 18. Physical Tamper Resistance
BookmarkLevel: 1
BookmarkPageNumber: 527
BookmarkBegin
BookmarkTitle: 19. Side Channels
BookmarkLevel: 1
BookmarkPageNumber: 562
BookmarkBegin
BookmarkTitle: 20. Advanced Cryptographic Engineering
BookmarkLevel: 1
BookmarkPageNumber: 586
BookmarkBegin
BookmarkTitle: 21. Network Attack and Defence
BookmarkLevel: 1
BookmarkPageNumber: 615
BookmarkBegin
BookmarkTitle: 22. Phones
BookmarkLevel: 1
BookmarkPageNumber: 648
BookmarkBegin
BookmarkTitle: 23. Electronic and Information Warfare
BookmarkLevel: 1
BookmarkPageNumber: 684
BookmarkBegin
BookmarkTitle: 24: Copyright and DRM
BookmarkLevel: 1
BookmarkPageNumber: 717
BookmarkBegin
BookmarkTitle: 25: Taking Stock
BookmarkLevel: 1
BookmarkPageNumber: 761
BookmarkBegin
BookmarkTitle: 26. Surveillance or Privacy?
BookmarkLevel: 1
BookmarkPageNumber: 798
BookmarkBegin
BookmarkTitle: 27. Secure Systems Development
BookmarkLevel: 1
BookmarkPageNumber: 846
BookmarkBegin
BookmarkTitle: 28. Assurance and Sustainability
BookmarkLevel: 1
BookmarkPageNumber: 889
BookmarkBegin
BookmarkTitle: 29. Beyond “Computer Says No”
BookmarkLevel: 1
BookmarkPageNumber: 928
BookmarkBegin
BookmarkTitle: Bibliography
BookmarkLevel: 1
BookmarkPageNumber: 930
Loading…
Cancel
Save