diff --git a/README.md b/README.md index a578775..45a182d 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ *Update*: The website currently only has 7 sample chapters since the remaining were removed at the book's publication, so this downloads the remaining chapters via [The Web Archive](https://web.archive.org/). -![third-edition-security-engineering-book-cover](cover-thumb.jpg) +![third-edition-security-engineering-book-cover](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-coversmall.jpg) This is just the script to generate a combined PDF from the draft chapters that were published for review. The script also takes care of putting in the right bookmarks for all the chapters in the generated PDF file using [pystitcher](https://pypi.org/project/pystitcher/). diff --git a/book.md b/book.md index 0c280c7..930cc8d 100644 --- a/book.md +++ b/book.md @@ -2,34 +2,65 @@ title: Security Engineering — Third Edition author: Ross Anderson [Cover](cover.pdf) + [Preface](SEv3-pref-May16.pdf) + [1. What is Security Engineering?](SEv3-ch1-7sep.pdf) + [2. Who is the Opponent?](SEv3-ch2-7sep.pdf) + [3. Psychology and Usability](SEv3-ch3-7sep.pdf) + [4. Protocols](SEv3-ch4-7sep.pdf) + [5. Cryptography](SEv3-ch5-7sep.pdf) + [6. Access Control](SEv3-ch6-7sep.pdf) + [7. Distributed Systems](SEv3-ch7-7sep.pdf) + [8. Economics](SEv3-ch8-7sep.pdf) + [9. Multilevel Security](SEv3-ch9-7sep.pdf) + [10. Boundaries](SEv3-ch10-7sep.pdf) + [11. Inference Control](SEv3-ch11-7sep.pdf) + [12. Banking and Bookkeeping](SEv3-ch12-7sep.pdf) + [13. Physical Protection](SEv3-ch13-7sep.pdf) + [14. Monitoring and Metering](SEv3-ch14-7sep.pdf) + [15. Nuclear Command and Control](SEv3-ch15-7sep.pdf) + [16. Security Printing and Seals](SEv3-ch16-7sep.pdf) + [17. Biometrics](SEv3-ch17-7sep.pdf) + [18. Physical Tamper Resistance](SEv3-ch18-7sep.pdf) + [19. Side Channels](SEv3-ch19-7sep.pdf) + [20. Advanced Cryptographic Engineering](SEv3-ch20-7sep.pdf) + [21. Network Attack and Defence](SEv3-ch21-7sep.pdf) + [22. Phones](SEv3-ch22-7sep.pdf) + [23. Electronic and Information Warfare](SEv3-ch23-7sep.pdf) + [24: Copyright and DRM](SEv3-ch24-7sep.pdf) + [25: Taking Stock](SEv3-ch25-7sep.pdf) + [26. Surveillance or Privacy?](SEv3-ch26-7sep.pdf) + [27. Secure Systems Development](SEv3-ch27-7sep.pdf) + [28. Assurance and Sustainability](SEv3-ch28-7sep.pdf) + [29. Beyond “Computer Says No”](SEv3-ch29-7sep.pdf) + [Bibliography](SEv3-bib-7sep.pdf) \ No newline at end of file diff --git a/cover-thumb.jpg b/cover-thumb.jpg deleted file mode 100644 index ff47acb..0000000 Binary files a/cover-thumb.jpg and /dev/null differ diff --git a/cover.jpg b/cover.jpg deleted file mode 100644 index cdd3b10..0000000 Binary files a/cover.jpg and /dev/null differ diff --git a/generate.sh b/generate.sh index d787146..f2a7625 100755 --- a/generate.sh +++ b/generate.sh @@ -1,8 +1,5 @@ -#!/bin/ash -set -euo pipefail -IFS=$'\n\t' +#!/bin/sh -COVER_URL=https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.pdf FINAL_PDF=security-engineering-3rd-edition.pdf INPUT_FILE="urls.txt" diff --git a/meta.txt b/meta.txt deleted file mode 100644 index f56b3c5..0000000 --- a/meta.txt +++ /dev/null @@ -1,134 +0,0 @@ -InfoBegin -InfoKey: Title -InfoValue: Security Engineering — Third Edition -InfoBegin -InfoKey: Author -InfoValue: Ross Anderson -BookmarkBegin -BookmarkTitle: Cover -BookmarkLevel: 1 -BookmarkPageNumber: 1 -BookmarkBegin -BookmarkTitle: Preface -BookmarkLevel: 1 -BookmarkPageNumber: 2 -BookmarkBegin -BookmarkTitle: 1. What is Security Engineering? -BookmarkLevel: 1 -BookmarkPageNumber: 4 -BookmarkBegin -BookmarkTitle: 2. Who is the Opponent? -BookmarkLevel: 1 -BookmarkPageNumber: 17 -BookmarkBegin -BookmarkTitle: 3. Psychology and Usability -BookmarkLevel: 1 -BookmarkPageNumber: 57 -BookmarkBegin -BookmarkTitle: 4. Protocols -BookmarkLevel: 1 -BookmarkPageNumber: 107 -BookmarkBegin -BookmarkTitle: 5. Cryptography -BookmarkLevel: 1 -BookmarkPageNumber: 131 -BookmarkBegin -BookmarkTitle: 6. Access Control -BookmarkLevel: 1 -BookmarkPageNumber: 187 -BookmarkBegin -BookmarkTitle: 7. Distributed Systems -BookmarkLevel: 1 -BookmarkPageNumber: 218 -BookmarkBegin -BookmarkTitle: 8. Economics -BookmarkLevel: 1 -BookmarkPageNumber: 245 -BookmarkBegin -BookmarkTitle: 9. Multilevel Security -BookmarkLevel: 1 -BookmarkPageNumber: 279 -BookmarkBegin -BookmarkTitle: 10. Boundaries -BookmarkLevel: 1 -BookmarkPageNumber: 302 -BookmarkBegin -BookmarkTitle: 11. Inference Control -BookmarkLevel: 1 -BookmarkPageNumber: 331 -BookmarkBegin -BookmarkTitle: 12. Banking and Bookkeeping -BookmarkLevel: 1 -BookmarkPageNumber: 356 -BookmarkBegin -BookmarkTitle: 13. Physical Protection -BookmarkLevel: 1 -BookmarkPageNumber: 414 -BookmarkBegin -BookmarkTitle: 14. Monitoring and Metering -BookmarkLevel: 1 -BookmarkPageNumber: 437 -BookmarkBegin -BookmarkTitle: 15. Nuclear Command and Control -BookmarkLevel: 1 -BookmarkPageNumber: 465 -BookmarkBegin -BookmarkTitle: 16. Security Printing and Seals -BookmarkLevel: 1 -BookmarkPageNumber: 482 -BookmarkBegin -BookmarkTitle: 17. Biometrics -BookmarkLevel: 1 -BookmarkPageNumber: 502 -BookmarkBegin -BookmarkTitle: 18. Physical Tamper Resistance -BookmarkLevel: 1 -BookmarkPageNumber: 527 -BookmarkBegin -BookmarkTitle: 19. Side Channels -BookmarkLevel: 1 -BookmarkPageNumber: 562 -BookmarkBegin -BookmarkTitle: 20. Advanced Cryptographic Engineering -BookmarkLevel: 1 -BookmarkPageNumber: 586 -BookmarkBegin -BookmarkTitle: 21. Network Attack and Defence -BookmarkLevel: 1 -BookmarkPageNumber: 615 -BookmarkBegin -BookmarkTitle: 22. Phones -BookmarkLevel: 1 -BookmarkPageNumber: 648 -BookmarkBegin -BookmarkTitle: 23. Electronic and Information Warfare -BookmarkLevel: 1 -BookmarkPageNumber: 684 -BookmarkBegin -BookmarkTitle: 24: Copyright and DRM -BookmarkLevel: 1 -BookmarkPageNumber: 717 -BookmarkBegin -BookmarkTitle: 25: Taking Stock -BookmarkLevel: 1 -BookmarkPageNumber: 761 -BookmarkBegin -BookmarkTitle: 26. Surveillance or Privacy? -BookmarkLevel: 1 -BookmarkPageNumber: 798 -BookmarkBegin -BookmarkTitle: 27. Secure Systems Development -BookmarkLevel: 1 -BookmarkPageNumber: 846 -BookmarkBegin -BookmarkTitle: 28. Assurance and Sustainability -BookmarkLevel: 1 -BookmarkPageNumber: 889 -BookmarkBegin -BookmarkTitle: 29. Beyond “Computer Says No” -BookmarkLevel: 1 -BookmarkPageNumber: 928 -BookmarkBegin -BookmarkTitle: Bibliography -BookmarkLevel: 1 -BookmarkPageNumber: 930