summaryrefslogtreecommitdiff
path: root/cover.adoci
diff options
context:
space:
mode:
authorOlivier Gayot <duskcoder@gmail.com>2015-05-10 20:36:08 +0100
committerOlivier Gayot <duskcoder@gmail.com>2015-05-10 20:36:08 +0100
commit0d0e3b3c05b5e3004f526bf0ace02885c36ce2d5 (patch)
treefa151f80dcdf2ca2174ac83aa137333947ef1a19 /cover.adoci
parent013d621eb8e5493e1401a69ac99da1485d46cc37 (diff)
use *.asciidoc(i) extension instead of *.adoc(i)
Signed-off-by: Olivier Gayot <duskcoder@gmail.com>
Diffstat (limited to 'cover.adoci')
-rw-r--r--cover.adoci14
1 files changed, 0 insertions, 14 deletions
diff --git a/cover.adoci b/cover.adoci
deleted file mode 100644
index f7eeb4e..0000000
--- a/cover.adoci
+++ /dev/null
@@ -1,14 +0,0 @@
-Computer Security Logbook
-=========================
-Olivier Gayot <ojgg2@kent.ac.uk>
-v1.0, January 2015
-:doctype: book
-:numbered: yes
-:toc: yes
-
-The purpose of this document is to describe and explain how we solved the
-problems that we encountered during the practical sessions of computer
-security. We are also welcome to share in this document any other thought. Last
-but not least, this document will serve as evidence of completion of the
-practical.
-