Remove unused stuff
This commit is contained in:
parent
03a251f4a3
commit
cbcaf25af7
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
*Update*: The website currently only has 7 sample chapters since the remaining were removed at the book's publication, so this downloads the remaining chapters via [The Web Archive](https://web.archive.org/).
|
*Update*: The website currently only has 7 sample chapters since the remaining were removed at the book's publication, so this downloads the remaining chapters via [The Web Archive](https://web.archive.org/).
|
||||||
|
|
||||||
![third-edition-security-engineering-book-cover](cover-thumb.jpg)
|
![third-edition-security-engineering-book-cover](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-coversmall.jpg)
|
||||||
|
|
||||||
This is just the script to generate a combined PDF from the draft chapters that were published for review. The script also takes care of putting in the right bookmarks for all the chapters in the generated PDF file using [pystitcher](https://pypi.org/project/pystitcher/).
|
This is just the script to generate a combined PDF from the draft chapters that were published for review. The script also takes care of putting in the right bookmarks for all the chapters in the generated PDF file using [pystitcher](https://pypi.org/project/pystitcher/).
|
||||||
|
|
||||||
|
|
31
book.md
31
book.md
|
@ -2,34 +2,65 @@ title: Security Engineering — Third Edition
|
||||||
author: Ross Anderson
|
author: Ross Anderson
|
||||||
|
|
||||||
[Cover](cover.pdf)
|
[Cover](cover.pdf)
|
||||||
|
|
||||||
[Preface](SEv3-pref-May16.pdf)
|
[Preface](SEv3-pref-May16.pdf)
|
||||||
|
|
||||||
[1. What is Security Engineering?](SEv3-ch1-7sep.pdf)
|
[1. What is Security Engineering?](SEv3-ch1-7sep.pdf)
|
||||||
|
|
||||||
[2. Who is the Opponent?](SEv3-ch2-7sep.pdf)
|
[2. Who is the Opponent?](SEv3-ch2-7sep.pdf)
|
||||||
|
|
||||||
[3. Psychology and Usability](SEv3-ch3-7sep.pdf)
|
[3. Psychology and Usability](SEv3-ch3-7sep.pdf)
|
||||||
|
|
||||||
[4. Protocols](SEv3-ch4-7sep.pdf)
|
[4. Protocols](SEv3-ch4-7sep.pdf)
|
||||||
|
|
||||||
[5. Cryptography](SEv3-ch5-7sep.pdf)
|
[5. Cryptography](SEv3-ch5-7sep.pdf)
|
||||||
|
|
||||||
[6. Access Control](SEv3-ch6-7sep.pdf)
|
[6. Access Control](SEv3-ch6-7sep.pdf)
|
||||||
|
|
||||||
[7. Distributed Systems](SEv3-ch7-7sep.pdf)
|
[7. Distributed Systems](SEv3-ch7-7sep.pdf)
|
||||||
|
|
||||||
[8. Economics](SEv3-ch8-7sep.pdf)
|
[8. Economics](SEv3-ch8-7sep.pdf)
|
||||||
|
|
||||||
[9. Multilevel Security](SEv3-ch9-7sep.pdf)
|
[9. Multilevel Security](SEv3-ch9-7sep.pdf)
|
||||||
|
|
||||||
[10. Boundaries](SEv3-ch10-7sep.pdf)
|
[10. Boundaries](SEv3-ch10-7sep.pdf)
|
||||||
|
|
||||||
[11. Inference Control](SEv3-ch11-7sep.pdf)
|
[11. Inference Control](SEv3-ch11-7sep.pdf)
|
||||||
|
|
||||||
[12. Banking and Bookkeeping](SEv3-ch12-7sep.pdf)
|
[12. Banking and Bookkeeping](SEv3-ch12-7sep.pdf)
|
||||||
|
|
||||||
[13. Physical Protection](SEv3-ch13-7sep.pdf)
|
[13. Physical Protection](SEv3-ch13-7sep.pdf)
|
||||||
|
|
||||||
[14. Monitoring and Metering](SEv3-ch14-7sep.pdf)
|
[14. Monitoring and Metering](SEv3-ch14-7sep.pdf)
|
||||||
|
|
||||||
[15. Nuclear Command and Control](SEv3-ch15-7sep.pdf)
|
[15. Nuclear Command and Control](SEv3-ch15-7sep.pdf)
|
||||||
|
|
||||||
[16. Security Printing and Seals](SEv3-ch16-7sep.pdf)
|
[16. Security Printing and Seals](SEv3-ch16-7sep.pdf)
|
||||||
|
|
||||||
[17. Biometrics](SEv3-ch17-7sep.pdf)
|
[17. Biometrics](SEv3-ch17-7sep.pdf)
|
||||||
|
|
||||||
[18. Physical Tamper Resistance](SEv3-ch18-7sep.pdf)
|
[18. Physical Tamper Resistance](SEv3-ch18-7sep.pdf)
|
||||||
|
|
||||||
[19. Side Channels](SEv3-ch19-7sep.pdf)
|
[19. Side Channels](SEv3-ch19-7sep.pdf)
|
||||||
|
|
||||||
[20. Advanced Cryptographic Engineering](SEv3-ch20-7sep.pdf)
|
[20. Advanced Cryptographic Engineering](SEv3-ch20-7sep.pdf)
|
||||||
|
|
||||||
[21. Network Attack and Defence](SEv3-ch21-7sep.pdf)
|
[21. Network Attack and Defence](SEv3-ch21-7sep.pdf)
|
||||||
|
|
||||||
[22. Phones](SEv3-ch22-7sep.pdf)
|
[22. Phones](SEv3-ch22-7sep.pdf)
|
||||||
|
|
||||||
[23. Electronic and Information Warfare](SEv3-ch23-7sep.pdf)
|
[23. Electronic and Information Warfare](SEv3-ch23-7sep.pdf)
|
||||||
|
|
||||||
[24: Copyright and DRM](SEv3-ch24-7sep.pdf)
|
[24: Copyright and DRM](SEv3-ch24-7sep.pdf)
|
||||||
|
|
||||||
[25: Taking Stock](SEv3-ch25-7sep.pdf)
|
[25: Taking Stock](SEv3-ch25-7sep.pdf)
|
||||||
|
|
||||||
[26. Surveillance or Privacy?](SEv3-ch26-7sep.pdf)
|
[26. Surveillance or Privacy?](SEv3-ch26-7sep.pdf)
|
||||||
|
|
||||||
[27. Secure Systems Development](SEv3-ch27-7sep.pdf)
|
[27. Secure Systems Development](SEv3-ch27-7sep.pdf)
|
||||||
|
|
||||||
[28. Assurance and Sustainability](SEv3-ch28-7sep.pdf)
|
[28. Assurance and Sustainability](SEv3-ch28-7sep.pdf)
|
||||||
|
|
||||||
[29. Beyond “Computer Says No”](SEv3-ch29-7sep.pdf)
|
[29. Beyond “Computer Says No”](SEv3-ch29-7sep.pdf)
|
||||||
|
|
||||||
[Bibliography](SEv3-bib-7sep.pdf)
|
[Bibliography](SEv3-bib-7sep.pdf)
|
BIN
cover-thumb.jpg
BIN
cover-thumb.jpg
Binary file not shown.
Before Width: | Height: | Size: 29 KiB |
|
@ -1,8 +1,5 @@
|
||||||
#!/bin/ash
|
#!/bin/sh
|
||||||
set -euo pipefail
|
|
||||||
IFS=$'\n\t'
|
|
||||||
|
|
||||||
COVER_URL=https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-cover.pdf
|
|
||||||
FINAL_PDF=security-engineering-3rd-edition.pdf
|
FINAL_PDF=security-engineering-3rd-edition.pdf
|
||||||
INPUT_FILE="urls.txt"
|
INPUT_FILE="urls.txt"
|
||||||
|
|
||||||
|
|
134
meta.txt
134
meta.txt
|
@ -1,134 +0,0 @@
|
||||||
InfoBegin
|
|
||||||
InfoKey: Title
|
|
||||||
InfoValue: Security Engineering — Third Edition
|
|
||||||
InfoBegin
|
|
||||||
InfoKey: Author
|
|
||||||
InfoValue: Ross Anderson
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: Cover
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 1
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: Preface
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 2
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 1. What is Security Engineering?
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 4
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 2. Who is the Opponent?
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 17
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 3. Psychology and Usability
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 57
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 4. Protocols
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 107
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 5. Cryptography
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 131
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 6. Access Control
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 187
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 7. Distributed Systems
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 218
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 8. Economics
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 245
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 9. Multilevel Security
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 279
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 10. Boundaries
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 302
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 11. Inference Control
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 331
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 12. Banking and Bookkeeping
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 356
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 13. Physical Protection
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 414
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 14. Monitoring and Metering
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 437
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 15. Nuclear Command and Control
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 465
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 16. Security Printing and Seals
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 482
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 17. Biometrics
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 502
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 18. Physical Tamper Resistance
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 527
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 19. Side Channels
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 562
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 20. Advanced Cryptographic Engineering
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 586
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 21. Network Attack and Defence
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 615
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 22. Phones
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 648
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 23. Electronic and Information Warfare
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 684
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 24: Copyright and DRM
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 717
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 25: Taking Stock
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 761
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 26. Surveillance or Privacy?
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 798
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 27. Secure Systems Development
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 846
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 28. Assurance and Sustainability
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 889
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: 29. Beyond “Computer Says No”
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 928
|
|
||||||
BookmarkBegin
|
|
||||||
BookmarkTitle: Bibliography
|
|
||||||
BookmarkLevel: 1
|
|
||||||
BookmarkPageNumber: 930
|
|
Loading…
Reference in New Issue