{"id":107,"date":"2018-08-24T15:33:40","date_gmt":"2018-08-24T19:33:40","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001f2018\/?page_id=107"},"modified":"2019-08-28T17:20:33","modified_gmt":"2019-08-28T21:20:33","slug":"course-materials","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/about\/course-materials\/","title":{"rendered":"Course materials"},"content":{"rendered":"<p>The following materials are required:<\/p>\n<ul>\n<li>\u201cSecurity Engineering: A Guide to Building Dependable Distributed Systems 2nd Edition,\u201d by Ross Anderson.\n<ul>\n<li>\n<p>Free PDF of the book: <a href=\"http:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\">http:\/\/www.cl.cam.ac.uk\/~rja14\/book.html<\/a>\u00a0(note that some chapters of the 3rd edition are available to download. Where an updated chapter is available, read that chapter instead).<\/p>\n<\/li>\n<li>Amazon: <a href=\"https:\/\/www.amzn.com\/0470068523\">https:\/\/www.amzn.com\/0470068523<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\n<p>Two business cases are required reading this year, which can be purchased at a cost of $8.50 here:\u00a0<a href=\"https:\/\/hbsp.harvard.edu\/import\/653422\">https:\/\/hbsp.harvard.edu\/import\/653422<\/a><\/p>\n<\/li>\n<\/ul>\n<p>Optional materials:<\/p>\n<ul>\n<li>\u201cSecrets and Lies: Digital Security in a Networked World,\u201d by Bruce Schneier.\n<ul>\n<li>Available online via Temple Library: <a href=\"https:\/\/goo.gl\/ty5y2Z\">https:\/\/goo.gl\/ty5y2Z <\/a><\/li>\n<li>Amazon: <a href=\"https:\/\/amzn.com\/0471453803\">https:\/\/amzn.com\/0471453803<\/a>\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The following materials are required: \u201cSecurity Engineering: A Guide to Building Dependable Distributed Systems 2nd Edition,\u201d by Ross Anderson. Free PDF of the book: http:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\u00a0(note that some chapters of the 3rd edition are available to download. Where an updated chapter is available, read that chapter instead). Amazon: https:\/\/www.amzn.com\/0470068523 Two business cases are required reading this [&hellip;]<\/p>\n","protected":false},"author":20390,"featured_media":0,"parent":8,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-107","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/users\/20390"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/comments?post=107"}],"version-history":[{"count":6,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/107\/revisions"}],"predecessor-version":[{"id":364,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/107\/revisions\/364"}],"up":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/pages\/8"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis4596sec002spring2020\/wp-json\/wp\/v2\/media?parent=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}