aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
Diffstat (limited to 'doc')
-rw-r--r--doc/contents.txt3
-rw-r--r--doc/index.txt22
-rw-r--r--doc/reading.txt23
3 files changed, 25 insertions, 23 deletions
diff --git a/doc/contents.txt b/doc/contents.txt
index 633625e14..16060e82a 100644
--- a/doc/contents.txt
+++ b/doc/contents.txt
@@ -6,6 +6,7 @@ Contents
:maxdepth: 2
index
+ reading
building
firststep
filters
@@ -24,6 +25,7 @@ Contents
.. toctree::
:hidden:
+ log
license
credits
faq
@@ -32,7 +34,6 @@ Contents
download
pgpkey
algos
- log
build_log
Indices and tables
diff --git a/doc/index.txt b/doc/index.txt
index b8d33602d..f2f54e557 100644
--- a/doc/index.txt
+++ b/doc/index.txt
@@ -66,25 +66,3 @@ be a bug, please file a ticket in `Bugzilla
A useful reference while reading this manual is the `Doxygen
documentation <http://botan.randombit.net/doxygen>`_.
-Recommended Reading
-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
-It's a very good idea if you have some knowledge of cryptography
-*before* trying to use the library. This is an area where it is very
-easy to make mistakes, and where things are often subtle and/or
-counterintuitive. Obviously the library tries to provide things at a
-high level precisely to minimize the number of ways things can go
-wrong, but naive use will almost certainly not result in a secure
-system.
-
-Especially recommended are:
-
-- *Cryptography Engineering*
- Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno
-
-- *Security Engineering -- A Guide to Building Dependable Distributed Systems*
- Ross Anderson
-
-- *Handbook of Applied Cryptography*
- Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone
- (`available online <http://www.cacr.math.uwaterloo.ca/hac/>`_)
diff --git a/doc/reading.txt b/doc/reading.txt
new file mode 100644
index 000000000..a0e547296
--- /dev/null
+++ b/doc/reading.txt
@@ -0,0 +1,23 @@
+
+Recommended Reading
+========================================
+
+It's a very good idea if you have some knowledge of cryptography
+*before* trying to use the library. This is an area where it is very
+easy to make mistakes, and where things are often subtle and/or
+counterintuitive. Obviously the library tries to provide things at a
+high level precisely to minimize the number of ways things can go
+wrong, but naive use will almost certainly not result in a secure
+system.
+
+Especially recommended are:
+
+- *Cryptography Engineering*
+ Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno
+
+- *Security Engineering -- A Guide to Building Dependable Distributed Systems*
+ Ross Anderson
+
+- *Handbook of Applied Cryptography*
+ Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone
+ (`available online <http://www.cacr.math.uwaterloo.ca/hac/>`_)