tag:blogger.com,1999:blog-4088979.post116156581618667893..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Pre-Review of Four BooksRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-1161793288756551712006-10-25T12:21:00.000-04:002006-10-25T12:21:00.000-04:00Read Bishop and Anderson's books if you're interes...Read Bishop and Anderson's books if you're interested in graduate level study of security. Skip Pfleeger, as it's a mediocre undergraduate textbook.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1161707671543911882006-10-24T12:34:00.000-04:002006-10-24T12:34:00.000-04:00Gary told me that he'd traced the "misuse" of thre...Gary told me that he'd traced the "misuse" of threat to a difference in the use of the term between the US and the UK militaries. New Zealand follows UK usage, and the rest is a series of unconnected events.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1161567216652254542006-10-22T21:33:00.000-04:002006-10-22T21:33:00.000-04:00"8 Layers" eh?So I guess the joke about layer 8 pr..."8 Layers" eh?<BR/><BR/>So I guess the joke about layer 8 problems has now become formalized?Anonymousnoreply@blogger.com