Re: Highly recommended - I have a paper copy

2013-02-20 Thread Kurt Buff
Glad to hear it.

On Wed, Feb 20, 2013 at 1:09 PM, Ziots, Edward  wrote:
> Kurt
>
> Thanks for the recommendation I just got my copy of the book and started to 
> read through, definitely good so far.
>
> Z
>
> Edward E. Ziots, CISSP, Security +, Network +
> Security Engineer
> Lifespan Organization
> ezi...@lifespan.org
>
> This electronic message and any attachments may be privileged and 
> confidential and protected from disclosure. If you are reading this message, 
> but are not the intended recipient, nor an employee or agent responsible for 
> delivering this message to the intended recipient, you are hereby notified 
> that you are strictly prohibited from copying, printing, forwarding or 
> otherwise disseminating this communication. If you have received this 
> communication in error, please immediately notify the sender by replying to 
> the message. Then, delete the message from your computer. Thank you.
>
>
>
>
> -Original Message-
> From: Kurt Buff [mailto:kurt.b...@gmail.com]
> Sent: Thursday, February 07, 2013 5:20 PM
> To: NT System Admin Issues
> Subject: Highly recommended - I have a paper copy
>
> -- Forwarded message --
> From: InfoSec News 
> Date: Wed, Feb 6, 2013 at 11:41 PM
> Subject: [ISN] Security Engineering -- The Book - For Free!
> To: i...@infosecnews.org
>
>
> http://www.cl.cam.ac.uk/~rja14/book.html
>
> Security Engineering -- The Book
>
> ‘I'm incredibly impressed that one person could produce such a thorough 
> coverage. Moreover, you make the stuff easy and enjoyable to read. I find it 
> just as entertaining - and far more useful - than novels (and my normal 
> science fiction). When I first got it in the mail, I said to myself "I'm 
> never going to read all of that." But once I started reading I just kept 
> going and going. Fantastic: well done.
> Now, let's hope that all those in charge of security for information 
> technology will also read the book and heed the lessons.’ Don Norman
>
> ‘The book that you MUST READ RIGHT NOW is the second edition of Ross 
> Anderson's Security Engineering book. Ross did a complete pass on his classic 
> tome and somehow made it even better...’ Gary McGraw
>
> ‘It's beautiful. This is the best book on the topic there is’
> Bruce Schneier
>
> All chapters from the second edition now available free online!
>
> Table of contents
> Preface
> Acknowledgements
> Chapter 1: What is Security Engineering?
> Chapter 2: Usability and Psychology
> Chapter 3: Protocols
> Chapter 4: Access Control
> Chapter 5: Cryptography
> Chapter 6: Distributed Systems
> Chapter 7: Economics
> Chapter 8: Multilevel Security
> Chapter 9: Multilateral Security
> Chapter 10: Banking and Bookkeeping
> Chapter 11: Physical Protection
> Chapter 12: Monitoring and Metering
> Chapter 13: Nuclear Command and Control
> Chapter 14: Security Printing and Seals
> Chapter 15: Biometrics
> Chapter 16: Physical Tamper Resistance
> Chapter 17: Emission Security
> Chapter 18: API Security
> Chapter 19: Electronic and Information Warfare Chapter 20: Telecom System 
> Security Chapter 21: Network Attack and Defence Chapter 22: Copyright and DRM 
> Chapter 23: The Bleeding Edge Chapter 24: Terror, Justice and Freedom Chapter 
> 25: Managing the Development of Secure Systems Chapter 26: System Evaluation 
> and Assurance Chapter 27: Conclusions Bibliography Index
>
> When I wrote the first edition, we put the chapters online free after four 
> years and found that this boosted sales of the paper edition.
> People would find a useful chapter online and then buy the book to have it as 
> a reference. Wiley and I agreed to do the same with the second edition, and 
> now, four years after publication, I am putting all the chapters online for 
> free. Enjoy them – and I hope you'll buy the paper version to have as a 
> conveient shelf reference:
>
> Buy from Amazon.com
> Buy from Wiley
> Buy from Amazon.co.uk (Kindle version)
>
> Here are the errata for the second edition, and here's a page of notes and 
> links concerning relevant topics that I've come across since publication.
>
> Supplementary materials: If you're a college professor thinking of using my 
> book in class, note that we use my book in three courses at
> Cambridge:
>
> * the first part in second-year Introduction to Security (course
>   material and past exam questions)
>
> * the second in third-year Security (course material and questions), and
>
> * the third part in our second-year Software Engineering (course,
>   questions and still more questions).
>
> I hope you find these useful. You're welcome to use and adapt any of my 
> slides if you wish under this Creative Commons license. Also, if you're an 
> instructor at an accredited institution, you can request an evaluation copy 
> via Wiley's website.
>
>
> __
> Visit the InfoSec News Security Bookstore Best Selling Security Books and 
> More!
> http://www.shopinfosecnews.org
>
> ~ Finally, powerfu

RE: Highly recommended - I have a paper copy

2013-02-20 Thread Ziots, Edward
Kurt 

Thanks for the recommendation I just got my copy of the book and started to 
read through, definitely good so far. 

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org

This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.




-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com] 
Sent: Thursday, February 07, 2013 5:20 PM
To: NT System Admin Issues
Subject: Highly recommended - I have a paper copy

-- Forwarded message --
From: InfoSec News 
Date: Wed, Feb 6, 2013 at 11:41 PM
Subject: [ISN] Security Engineering -- The Book - For Free!
To: i...@infosecnews.org


http://www.cl.cam.ac.uk/~rja14/book.html

Security Engineering -- The Book

‘I'm incredibly impressed that one person could produce such a thorough 
coverage. Moreover, you make the stuff easy and enjoyable to read. I find it 
just as entertaining - and far more useful - than novels (and my normal science 
fiction). When I first got it in the mail, I said to myself "I'm never going to 
read all of that." But once I started reading I just kept going and going. 
Fantastic: well done.
Now, let's hope that all those in charge of security for information technology 
will also read the book and heed the lessons.’ Don Norman

‘The book that you MUST READ RIGHT NOW is the second edition of Ross Anderson's 
Security Engineering book. Ross did a complete pass on his classic tome and 
somehow made it even better...’ Gary McGraw

‘It's beautiful. This is the best book on the topic there is’
Bruce Schneier

All chapters from the second edition now available free online!

Table of contents
Preface
Acknowledgements
Chapter 1: What is Security Engineering?
Chapter 2: Usability and Psychology
Chapter 3: Protocols
Chapter 4: Access Control
Chapter 5: Cryptography
Chapter 6: Distributed Systems
Chapter 7: Economics
Chapter 8: Multilevel Security
Chapter 9: Multilateral Security
Chapter 10: Banking and Bookkeeping
Chapter 11: Physical Protection
Chapter 12: Monitoring and Metering
Chapter 13: Nuclear Command and Control
Chapter 14: Security Printing and Seals
Chapter 15: Biometrics
Chapter 16: Physical Tamper Resistance
Chapter 17: Emission Security
Chapter 18: API Security
Chapter 19: Electronic and Information Warfare Chapter 20: Telecom System 
Security Chapter 21: Network Attack and Defence Chapter 22: Copyright and DRM 
Chapter 23: The Bleeding Edge Chapter 24: Terror, Justice and Freedom Chapter 
25: Managing the Development of Secure Systems Chapter 26: System Evaluation 
and Assurance Chapter 27: Conclusions Bibliography Index

When I wrote the first edition, we put the chapters online free after four 
years and found that this boosted sales of the paper edition.
People would find a useful chapter online and then buy the book to have it as a 
reference. Wiley and I agreed to do the same with the second edition, and now, 
four years after publication, I am putting all the chapters online for free. 
Enjoy them – and I hope you'll buy the paper version to have as a conveient 
shelf reference:

Buy from Amazon.com
Buy from Wiley
Buy from Amazon.co.uk (Kindle version)

Here are the errata for the second edition, and here's a page of notes and 
links concerning relevant topics that I've come across since publication.

Supplementary materials: If you're a college professor thinking of using my 
book in class, note that we use my book in three courses at
Cambridge:

* the first part in second-year Introduction to Security (course
  material and past exam questions)

* the second in third-year Security (course material and questions), and

* the third part in our second-year Software Engineering (course,
  questions and still more questions).

I hope you find these useful. You're welcome to use and adapt any of my slides 
if you wish under this Creative Commons license. Also, if you're an instructor 
at an accredited institution, you can request an evaluation copy via Wiley's 
website.


__
Visit the InfoSec News Security Bookstore Best Selling Security Books and More!
http://www.shopinfosecnews.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe n

RE: Highly recommended - I have a paper copy

2013-02-11 Thread Ziots, Edward
Thanks Sam, going to get this ordered also, will make a nice edition to my 
reading collection.

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org

This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[Description: Description: Lifespan]


From: Sam Cayze [mailto:sca...@gmail.com]
Sent: Friday, February 08, 2013 5:03 PM
To: NT System Admin Issues
Subject: RE: Highly recommended - I have a paper copy

Just read a chapter, and I have a say, I'm hooked.  Looking through the TOC, 
there are so many aspects of security in the book that I have been wanting a 
better understanding of.  All in one place.
I already downloaded and combined the PDFs... but heck, I'm buying the paper 
version of this one!




http://www.cl.cam.ac.uk/~rja14/book.html

Security Engineering -- The Book

'I'm incredibly impressed that one person could produce such a
thorough coverage. Moreover, you make the stuff easy and enjoyable to
read. I find it just as entertaining - and far more useful - than
novels (and my normal science fiction). When I first got it in the
mail, I said to myself "I'm never going to read all of that." But once
I started reading I just kept going and going. Fantastic: well done.
Now, let's hope that all those in charge of security for information
technology will also read the book and heed the lessons.' Don Norman

'The book that you MUST READ RIGHT NOW is the second edition of Ross
Anderson's Security Engineering book. Ross did a complete pass on his
classic tome and somehow made it even better...' Gary McGraw

'It's beautiful. This is the best book on the topic there is'
Bruce Schneier

All chapters from the second edition now available free online!

Table of contents
Preface
Acknowledgements
Chapter 1: What is Security Engineering?
Chapter 2: Usability and Psychology
Chapter 3: Protocols
Chapter 4: Access Control
Chapter 5: Cryptography
Chapter 6: Distributed Systems
Chapter 7: Economics
Chapter 8: Multilevel Security
Chapter 9: Multilateral Security
Chapter 10: Banking and Bookkeeping
Chapter 11: Physical Protection
Chapter 12: Monitoring and Metering
Chapter 13: Nuclear Command and Control
Chapter 14: Security Printing and Seals
Chapter 15: Biometrics
Chapter 16: Physical Tamper Resistance
Chapter 17: Emission Security
Chapter 18: API Security
Chapter 19: Electronic and Information Warfare
Chapter 20: Telecom System Security
Chapter 21: Network Attack and Defence
Chapter 22: Copyright and DRM
Chapter 23: The Bleeding Edge
Chapter 24: Terror, Justice and Freedom
Chapter 25: Managing the Development of Secure Systems
Chapter 26: System Evaluation and Assurance
Chapter 27: Conclusions
Bibliography
Index

When I wrote the first edition, we put the chapters online free after
four years and found that this boosted sales of the paper edition.
People would find a useful chapter online and then buy the book to
have it as a reference. Wiley and I agreed to do the same with the
second edition, and now, four years after publication, I am putting
all the chapters online for free. Enjoy them - and I hope you'll buy
the paper version to have as a conveient shelf reference:

Buy from Amazon.com
Buy from Wiley
Buy from Amazon.co.uk<http://Amazon.co.uk> (Kindle version)

Here are the errata for the second edition, and here's a page of notes
and links concerning relevant topics that I've come across since
publication.

Supplementary materials: If you're a college professor thinking of
using my book in class, note that we use my book in three courses at
Cambridge:

* the first part in second-year Introduction to Security (course
  material and past exam questions)

* the second in third-year Security (course material and questions), and

* the third part in our second-year Software Engineering (course,
  questions and still more questions).

I hope you find these useful. You're welcome to use and adapt any of
my slides if you wish under this Creative Commons license. Also, if
you're an instructor at an accredited institution, you can request an
evaluation copy via Wiley's website.


__
Visit the InfoSec News Security Bookstore
Best Selling Security Books and More!
http://www.shopinfosecnews.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.su

RE: Highly recommended - I have a paper copy

2013-02-08 Thread Sam Cayze
Just read a chapter, and I have a say, I'm hooked.  Looking through the TOC,
there are so many aspects of security in the book that I have been wanting a
better understanding of.  All in one place.

I already downloaded and combined the PDFs. but heck, I'm buying the paper
version of this one!

 

 



http://www.cl.cam.ac.uk/~rja14/book.html

Security Engineering -- The Book

'I'm incredibly impressed that one person could produce such a
thorough coverage. Moreover, you make the stuff easy and enjoyable to
read. I find it just as entertaining - and far more useful - than
novels (and my normal science fiction). When I first got it in the
mail, I said to myself "I'm never going to read all of that." But once
I started reading I just kept going and going. Fantastic: well done.
Now, let's hope that all those in charge of security for information
technology will also read the book and heed the lessons.' Don Norman

'The book that you MUST READ RIGHT NOW is the second edition of Ross
Anderson's Security Engineering book. Ross did a complete pass on his
classic tome and somehow made it even better...' Gary McGraw

'It's beautiful. This is the best book on the topic there is'
Bruce Schneier

All chapters from the second edition now available free online!

Table of contents
Preface
Acknowledgements
Chapter 1: What is Security Engineering?
Chapter 2: Usability and Psychology
Chapter 3: Protocols
Chapter 4: Access Control
Chapter 5: Cryptography
Chapter 6: Distributed Systems
Chapter 7: Economics
Chapter 8: Multilevel Security
Chapter 9: Multilateral Security
Chapter 10: Banking and Bookkeeping
Chapter 11: Physical Protection
Chapter 12: Monitoring and Metering
Chapter 13: Nuclear Command and Control
Chapter 14: Security Printing and Seals
Chapter 15: Biometrics
Chapter 16: Physical Tamper Resistance
Chapter 17: Emission Security
Chapter 18: API Security
Chapter 19: Electronic and Information Warfare
Chapter 20: Telecom System Security
Chapter 21: Network Attack and Defence
Chapter 22: Copyright and DRM
Chapter 23: The Bleeding Edge
Chapter 24: Terror, Justice and Freedom
Chapter 25: Managing the Development of Secure Systems
Chapter 26: System Evaluation and Assurance
Chapter 27: Conclusions
Bibliography
Index

When I wrote the first edition, we put the chapters online free after
four years and found that this boosted sales of the paper edition.
People would find a useful chapter online and then buy the book to
have it as a reference. Wiley and I agreed to do the same with the
second edition, and now, four years after publication, I am putting
all the chapters online for free. Enjoy them - and I hope you'll buy
the paper version to have as a conveient shelf reference:

Buy from Amazon.com
Buy from Wiley
Buy from Amazon.co.uk (Kindle version)

Here are the errata for the second edition, and here's a page of notes
and links concerning relevant topics that I've come across since
publication.

Supplementary materials: If you're a college professor thinking of
using my book in class, note that we use my book in three courses at
Cambridge:

* the first part in second-year Introduction to Security (course
  material and past exam questions)

* the second in third-year Security (course material and questions), and

* the third part in our second-year Software Engineering (course,
  questions and still more questions).

I hope you find these useful. You're welcome to use and adapt any of
my slides if you wish under this Creative Commons license. Also, if
you're an instructor at an accredited institution, you can request an
evaluation copy via Wiley's website.


__
Visit the InfoSec News Security Bookstore
Best Selling Security Books and More!
http://www.shopinfosecnews.org

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Re: Highly recommended - I have a paper copy

2013-02-07 Thread Andrew S. Baker
Thanks!





*ASB
**http://XeeMe.com/AndrewBaker* *
**Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market…***





On Thu, Feb 7, 2013 at 5:20 PM, Kurt Buff  wrote:

> -- Forwarded message --
> From: InfoSec News 
> Date: Wed, Feb 6, 2013 at 11:41 PM
> Subject: [ISN] Security Engineering -- The Book - For Free!
> To: i...@infosecnews.org
>
>
> http://www.cl.cam.ac.uk/~rja14/book.html
>
> Security Engineering -- The Book
>
> ‘I'm incredibly impressed that one person could produce such a
> thorough coverage. Moreover, you make the stuff easy and enjoyable to
> read. I find it just as entertaining - and far more useful - than
> novels (and my normal science fiction). When I first got it in the
> mail, I said to myself "I'm never going to read all of that." But once
> I started reading I just kept going and going. Fantastic: well done.
> Now, let's hope that all those in charge of security for information
> technology will also read the book and heed the lessons.’ Don Norman
>
> ‘The book that you MUST READ RIGHT NOW is the second edition of Ross
> Anderson's Security Engineering book. Ross did a complete pass on his
> classic tome and somehow made it even better...’ Gary McGraw
>
> ‘It's beautiful. This is the best book on the topic there is’
> Bruce Schneier
>
> All chapters from the second edition now available free online!
>
> Table of contents
> Preface
> Acknowledgements
> Chapter 1: What is Security Engineering?
> Chapter 2: Usability and Psychology
> Chapter 3: Protocols
> Chapter 4: Access Control
> Chapter 5: Cryptography
> Chapter 6: Distributed Systems
> Chapter 7: Economics
> Chapter 8: Multilevel Security
> Chapter 9: Multilateral Security
> Chapter 10: Banking and Bookkeeping
> Chapter 11: Physical Protection
> Chapter 12: Monitoring and Metering
> Chapter 13: Nuclear Command and Control
> Chapter 14: Security Printing and Seals
> Chapter 15: Biometrics
> Chapter 16: Physical Tamper Resistance
> Chapter 17: Emission Security
> Chapter 18: API Security
> Chapter 19: Electronic and Information Warfare
> Chapter 20: Telecom System Security
> Chapter 21: Network Attack and Defence
> Chapter 22: Copyright and DRM
> Chapter 23: The Bleeding Edge
> Chapter 24: Terror, Justice and Freedom
> Chapter 25: Managing the Development of Secure Systems
> Chapter 26: System Evaluation and Assurance
> Chapter 27: Conclusions
> Bibliography
> Index
>
> When I wrote the first edition, we put the chapters online free after
> four years and found that this boosted sales of the paper edition.
> People would find a useful chapter online and then buy the book to
> have it as a reference. Wiley and I agreed to do the same with the
> second edition, and now, four years after publication, I am putting
> all the chapters online for free. Enjoy them – and I hope you'll buy
> the paper version to have as a conveient shelf reference:
>
> Buy from Amazon.com
> Buy from Wiley
> Buy from Amazon.co.uk (Kindle version)
>
> Here are the errata for the second edition, and here's a page of notes
> and links concerning relevant topics that I've come across since
> publication.
>
> Supplementary materials: If you're a college professor thinking of
> using my book in class, note that we use my book in three courses at
> Cambridge:
>
> * the first part in second-year Introduction to Security (course
>   material and past exam questions)
>
> * the second in third-year Security (course material and questions), and
>
> * the third part in our second-year Software Engineering (course,
>   questions and still more questions).
>
> I hope you find these useful. You're welcome to use and adapt any of
> my slides if you wish under this Creative Commons license. Also, if
> you're an instructor at an accredited institution, you can request an
> evaluation copy via Wiley's website.
>
>
> __
> Visit the InfoSec News Security Bookstore
> Best Selling Security Books and More!
> http://www.shopinfosecnews.org
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to listmana...@lyris.sunbeltsoftware.com
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin