PrintNumber |
ErrorLocation |
Error |
Correction |
DateAdded |
1 |
piv |
printline needs updating |
|
10/28/2008 |
1 |
pxi |
We would like to thank Adams mom and Andrews wife. |
We would both like to thank Adams mom and Andrews wife. |
10/28/2008 |
1 |
pxiv |
Increase space between bullets. |
fixed |
10/28/2008 |
1 |
p56 |
According to their members, ISAC meetings are a great place to collect business cards but are not particularly useful for anything else. |
According to their members, ISAC meetings are a great place to collect business cards, but have not been useful for sharing technical information. |
10/28/2008 |
1 |
p87 |
In the case of electronic cash, questions also surround patents, law, and regulation, and raise the cost for everyone involved. |
In the case of electronic cash, there are also questions around patents, law, and regulation, which raise the cost for everyone involved. |
10/28/2008 |
1 |
p89 |
Because security is so difficult for prospective customers to evaluate, it is rarely prioritized above other factors in their purchasing process. |
In part because security is so difficult for prospective customers to evaluate, it is rarely prioritized above other factors in their purchasing process. |
10/28/2008 |
1 |
p137 |
If an insurance company offers homeowners insurance only in Florida, it has a different exposure to hurricane-related risks than a company that offers homeowners insurance only in California. |
If an insurance company offers homeowners insurance only in Florida, it has a different exposure to hurricane-related risks than a company that offers homeowners insurance only in California. |
10/28/2008 |
1 |
p169 |
Were thinking of Jack Andersons Computer Security Study, the work of Biba and Bell-LaPadula on formal models of security; and some of the Multics investigations into computer security that were all funded by the U.S. Department of Defense. |
Were thinking of Jack P. Andersons Computer Security Study, the work of Biba and Bell-LaPadula on formal models of security; and some of the Multics investigations into computer security that were all funded by the U.S. Department of Defense. |
10/28/2008 |
1 |
p174 |
Theres irony here, since early application layer firewalls such as the DEC SEAL or TIS Firewall Toolkit were beaten in the marketplace by faster packet filtering firewalls made by companies such as Checkpoint. |
Theres irony here, since early application layer firewalls such as the DEC SEAL or TIS Firewall Toolkit were beaten in the marketplace by faster packet filtering firewalls made by companies such as Check Point. |
10/28/2008 |
1 |
p187 |
Align first bold paragraph We hope... |
fixed |
10/28/2008 |