Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
xvii
Acknowledgments
ere are many folks who have made direct or indirect contributions
to Security De-Engineering, including family and friends, past and
present acquaintances, and experts in their respective elds.
First up is family—one that is split over two continents and seven
time zones. My wife Suzanna here in Jakarta has shown great toler-
ance and support while I have hidden myself away in production of this
narrative. ere is never enough time in a day; 24 hours just does not
cut it really. A lot of time that I would usually set aside for home time
was eaten into by the production of this book, and I thank Suzanna
for her patience during this testing period, and for my mother-in-law
for her expertise in the eld of beef rendang—I swea ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355