Managing Information Security Second Edition John R. Vacca
Managing Information Security Second Edition John R. Vacca
Managing Information Security Second Edition John R. Vacca
Managing Information Security Second Edition John R. Vacca
1. Managing Information Security Second Edition John R.
Vacca - PDF Download (2025)
https://ebookultra.com/download/managing-information-security-
second-edition-john-r-vacca/
Visit ebookultra.com today to download the complete set of
ebooks or textbooks
2. We have selected some products that you may be interested in
Click the link to download now or visit ebookultra.com
for more options!.
Holograms Holography Design Techniques Commercial
Applications John R. Vacca
https://ebookultra.com/download/holograms-holography-design-
techniques-commercial-applications-john-r-vacca/
Managing an Information Security and Privacy Awareness and
Training Program Second Edition Rebecca Herold
https://ebookultra.com/download/managing-an-information-security-and-
privacy-awareness-and-training-program-second-edition-rebecca-herold/
Wireless Data Demystified 1st Edition John Vacca
https://ebookultra.com/download/wireless-data-demystified-1st-edition-
john-vacca/
Cyber security and IT infrastructure protection 1st ed
Edition Vacca
https://ebookultra.com/download/cyber-security-and-it-infrastructure-
protection-1st-ed-edition-vacca/
3. Information Security Risk Analysis 1st Edition Thomas R.
Peltier
https://ebookultra.com/download/information-security-risk-
analysis-1st-edition-thomas-r-peltier/
Information Security Risk Analysis 2nd Edition Thomas R.
Peltier
https://ebookultra.com/download/information-security-risk-
analysis-2nd-edition-thomas-r-peltier/
Information Security Risk Analysis 3rd Edition Thomas R.
Peltier
https://ebookultra.com/download/information-security-risk-
analysis-3rd-edition-thomas-r-peltier/
Honeypots A New Paradigm to Information Security 1st
Edition R. C. Joshi
https://ebookultra.com/download/honeypots-a-new-paradigm-to-
information-security-1st-edition-r-c-joshi/
Techniques and Applications for Advanced Information
Privacy and Security Emerging Organizational Ethical and
Human Issues Advances in Information Security and Privacy
1st Edition Hamid R. Nemati
https://ebookultra.com/download/techniques-and-applications-for-
advanced-information-privacy-and-security-emerging-organizational-
ethical-and-human-issues-advances-in-information-security-and-
privacy-1st-edition-hamid-r-nemati/
5. Managing Information Security Second Edition John R.
Vacca Digital Instant Download
Author(s): John R. Vacca
ISBN(s): 9780124166882, 0124166881
Edition: 2
File Details: PDF, 13.55 MB
Year: 2013
Language: english
10. Publisher: Steven Elliot
Senior Developmental Editor: Nathaniel McFadden
Editorial Project Manager: Lindsay Lawrence
Project Manager: Mohanambal Natarajan
Designer: Matthew Limbert
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Second edition 2014
Copyright r 2014, 2009 Elsevier Inc. All rights reserved
No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form or by any means electronic, mechanical, photocopying, recording
or otherwise without the prior written permission of the publisher Permissions may be
sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK:
phone (144) (0) 1865 843830; fax (144) (0) 1865 853333; email: permissions@elsevier.com.
Alternatively you can submit your request online by visiting the Elsevier web site at
http://elsevier.com/locate/permissions, and selecting Obtaining permission to use
Elsevier material
Notice
No responsibility is assumed by the publisher for any injury and/or damage to persons
or property as a matter of products liability, negligence or otherwise, or from any use or
operation of any methods, products, instructions or ideas contained in the material herein.
Because of rapid advances in the medical sciences, in particular, independent verification
of diagnoses and drug dosages should be made
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
British Library Cataloguing in Publication Data
A catalogue record for this book is available from the British Library
For information on all Syngress publications,
visit our website at store.elsevier.com/Syngress
ISBN: 978-0-12-416688-2
Printed and bound in USA
14 15 16 17 18 10 9 8 7 6 5 4 3 2 1
13. Contents
Acknowledgments xi
About the Editor xiii
Contributors xv
Introduction xvii
1. Information Security Essentials for
IT Managers 1
ALBERT CABALLERO
1. Information Security Essentials for
IT Managers, Overview 1
2. Protecting Mission-Critical Systems 10
3. Information Security from the Ground
Up 17
4. Security Monitoring and
Effectiveness 37
5. Summary 42
Chapter Review Questions/Exercises 43
Exercise 45
2. Security Management Systems 47
JAMES T. HARMENING
1. Security Management System
Standards 47
2. Training Requirements 48
3. Principles of Information Security 48
4. Roles and Responsibilities of
Personnel 49
5. Security Policies 49
6. Security Controls 50
7. Network Access 51
8. Risk Assessment 51
9. Incident Response 52
10. Summary 53
Chapter Review Questions/Exercises 54
Exercise 55
3. Information Technology Security
Management 57
RAHUL BHASKAR AND BHUSHAN KAPOOR
1. Information Security Management
Standards 57
2. Other Organizations Involved in
Standards 60
3. Information Technology Security
Aspects 60
4. Summary 71
Chapter Review Questions/Exercises 72
Exercise 73
4. Online Identity and User Management
Services 75
TEWFIQ EL MALIKI AND JEAN-MARC SEIGNEUR
1. Introduction 75
2. Evolution of Identity Management
Requirements 76
3. The Requirements Fulfilled by Identity
Management Technologies 82
4. Identity Management 1.0 83
5. Social Login and User
Management 105
6. Identity 2.0 for Mobile Users 106
7. Summary 115
Chapter Review Questions/Exercises 115
Exercise 117
References 117
vii
14. 5. Intrusion Prevention and Detection
Systems 119
CHRISTOPHER DAY
1. What is an ‘Intrusion’ Anyway? 119
2. Physical Theft 119
3. Abuse of Privileges (The Insider
Threat) 120
4. Unauthorized Access by Outsider 121
5. Malware Infection 121
6. The Role of the ‘0-Day’ 123
7. The Rogue’s Gallery: Attackers and
Motives 124
8. A Brief Introduction to TCP/IP 125
9. The TCP/IP Data Architecture and
Data Encapsulation 126
10. Survey of Intrusion Detection and
Prevention Technologies 131
11. Anti-Malware Software 132
12. Network-Based Intrusion Detection
Systems 133
13. Network-Based Intrusion Prevention
Systems 134
14. Host-Based Intrusion Prevention
Systems 135
15. Security Information Management
Systems 135
16. Network Session Analysis 137
17. Digital Forensics 138
18. System Integrity Validation 138
19. Summary 139
Chapter Review Questions/Exercises 139
Exercise 140
References 141
6. Firewalls 143
DR. ERRIN W. FULP
1. Introduction 143
2. Network Firewalls 143
3. Firewall Security Policies 145
4. A Simple Mathematical Model for
Policies, Rules, and Packets 147
5. First-Match Firewall Policy
Anomalies 148
6. Policy Optimization 149
7. Firewall Types 151
8. Host and Network Firewalls 153
9. Software and Hardware Firewall
Implementations 154
10. Choosing the Correct Firewall 155
11. Firewall Placement and Network
Topology 155
12. Firewall Installation and
Configuration 159
13. Supporting Outgoing Services Through
Firewall Configuration 160
14. Secure External Services
Provisioning 162
15. Network Firewalls for Voice and Video
Applications 162
16. Firewalls and Important Administrative
Service Protocols 163
17. Internal IP Services Protection 166
18. Firewall Remote Access
Configuration 168
19. Load Balancing and Firewall
Arrays 169
20. Highly Available Firewalls 171
21. Firewall Management 172
22. Summary 173
Chapter Review Questions/Exercises 174
Exercise 175
7. Penetration Testing 177
SANJAY BAVISI
1. Introduction 177
2. What is Penetration Testing? 177
3. How Does Penetration Testing Differ
from an Actual “Hack?” 179
4. Types of Penetration Testing 180
5. Phases of Penetration Testing 183
6. Defining What’s Expected 186
7. The Need for a Methodology 186
8. Penetration Testing
Methodologies 187
9. Methodology in Action 188
10. Penetration Testing Risks 192
11. Liability Issues 193
viii CONTENTS
15. 12. Legal Consequences 193
13. “Get Out of Jail Free” Card 193
14. Penetration Testing Consultants 194
15. Required Skill Sets 195
16. Accomplishments 195
17. Hiring a Penetration Tester 196
18. Why Should a Company Hire
You? 197
19. Summary 198
Chapter Review Questions/Exercises 199
Exercise 200
8. What is Vulnerability
Assessment? 201
ALMANTAS KAKAREKA
1. Introduction 201
2. Reporting 202
3. The “It Won’t Happen to Us”
Factor 202
4. Why Vulnerability Assessment? 202
5. Penetration Testing Versus
Vulnerability Assessment 203
6. Vulnerability Assessment Goal 205
7. Mapping the Network 205
8. Selecting the Right Scanners 207
9. Central Scans Versus Local Scans 208
10. Defense in Depth Strategy 209
11. Vulnerability Assessment Tools 210
12. SARA 211
13. SAINT 211
14. MBSA 212
15. Scanner Performance 212
16. Scan Verification 212
17. Scanning Cornerstones 212
18. Network Scanning
Countermeasures 213
19. Vulnerability Disclosure Date 214
20. Proactive Security Versus Reactive
Security 216
21. Vulnerability Causes 217
22. Diy Vulnerability Assessment 218
23. Summary 219
Chapter Review Questions/Exercises 219
Exercise 220
9. Cyber Forensics 223
SCOTT R. ELLIS
1. What is Cyber Forensics? 223
2. Analysis of Data 225
3. Cyber Forensics in the Court
System 229
4. Understanding Internet History 230
5. Temporary Restraining Orders and
Labor Disputes 232
6. First Principles 251
7. Hacking a Windows XP Password 252
8. Network Analysis 256
9. Cyber Forensics Applied 257
10. Tracking, Inventory, Location of Files,
Paperwork, Backups, and so on 257
11. Testifying as an Expert 262
12. Beginning to End in Court 267
13. Summary 271
Chapter Review Questions/Exercises 272
Exercise 273
10. Cyber Forensics and Incident
Response 275
CEM GURKOK
1. Introduction to Cyber Forensics 275
2. Handling Preliminary
Investigations 277
3. Controlling an Investigation 280
4. Conducting Disk-Based Analysis 282
5. Investigating Information-Hiding
Techniques 287
6. Scrutinizing Email 292
7. Validating Email Header
Information 295
8. Tracing Internet Access 295
9. Searching Memory in Real Time 300
10. Summary 308
Chapter Review Questions/Exercises 309
ix
CONTENTS
16. Exercise 310
References 311
11. Network Forensics 313
YONG GUAN
1. Scientific Overview 313
2. The Principles of Network
Forensics 314
3. Attack Traceback and Attribution 318
4. Critical Needs Analysis 326
5. Research Directions 327
6. Summary 329
Chapter Review Questions/Exercises 332
Exercise 333
Index 335
x CONTENTS
17. Acknowledgements
There are many people whose efforts on
this book have contributed to its successful
completion. I owe each a debt of gratitude
and want to take this opportunity to offer
my sincere thanks.
A very special thanks to my publisher,
Steve Elliot, without whose continued
interest and support this book would not
have been possible. Senior development
editor Nate McFadden provided staunch
support and encouragement when it was
most needed. Thanks to my production
project manager, Mohanambal Natarajan,
whose fine work and attention to detail has
been invaluable. Thanks also to my market-
ing manager, Todd Conly, whose efforts on
this book have been greatly appreciated.
Finally, thanks to all the other people at
Morgan Kaufmann Publishers/Elsevier
Science & Technology Books, whose many
talents and skills are essential to a finished
book.
Thanks to my wife, Bee Vacca, for her love,
her help, and her understanding of my long
work hours. Finally, I wish to thank all the
following authors who contributed chapters
that were necessary for the completion of this
book: Sanjay Bavisi, Rahul Bhaskar, Albert
Caballero, Christopher Day, Scott R. Ellis,
Errin W. Fulp, Yong Guan, Cem Gurkok,
James T. Harmening, Almantas Kakareka,
Bhushan Kapoor, Jean-Marc Seigneur.
xi
19. About the Editor
John Vacca is an information technology
consultant, professional writer, editor,
reviewer and internationally-known, best-
selling author based in Pomeroy, Ohio.
Since 1982, John has authored 73 books
(some of his most recent books include):
• Computer and Information Security
Handbook, 2E (Publisher: Morgan
Kaufmann (an imprint of Elsevier Inc.)
(May 31, 2013))
• Identity Theft (Cybersafety) (Publisher:
Chelsea House Pub (April 1, 2012 )
• System Forensics, Investigation, And
Response (Publisher: Jones & Bartlett
Learning (September 24, 2010)
• Managing Information Security
(Publisher: Syngress (an imprint of
Elsevier Inc.) (March 29, 2010))
• Network and Systems Security
(Publisher: Syngress (an imprint of
Elsevier Inc.) (March 29, 2010))
• Computer and Information Security
Handbook, 1E (Publisher: Morgan
Kaufmann (an imprint of Elsevier Inc.)
(June 2, 2009))
• Biometric Technologies and
Verification Systems (Publisher: Elsevier
Science & Technology Books (March 16,
2007))
• Practical Internet Security (Hardcover):
(Publisher: Springer (October 18, 2006))
• Optical Networking Best Practices
Handbook (Hardcover): (Publisher:
Wiley-Interscience (November 28, 2006))
• Guide to Wireless Network Security
(Publisher: Springer (August 19, 2006)
• Computer Forensics: Computer Crime
Scene Investigation (With CD-ROM),
2nd Edition (Publisher: Charles River
Media (May 26, 2005)
and, more than 600 articles in the areas
of advanced storage, computer security and
aerospace technology (copies of articles and
books are available upon request). John
was also a configuration management spe-
cialist, computer specialist, and the com-
puter security official (CSO) for NASA’s
space station program (Freedom) and the
International Space Station Program, from
1988 until his retirement from NASA in
1995. In addition, John is also an indepen-
dent online book reviewer. Finally, John
was one of the security consultants for the
MGM movie titled: “AntiTrust,” which was
released on January 12, 2001. A detailed
copy of my author bio can be viewed at
URL: http:/
/www.johnvacca.com. John can
be reached at: john2164@windstream.net.
xiii
21. Contributors
Sanjay Bavisi (Chapter 7), President, EC-
Council, Selangor, Malaysia
Rahul Bhaskar (Chapter 3), Professor,
Department of Information Systems and
Decision Sciences, California State
University, Fullerton, CA 92834
Albert Caballero, CISSP,
GSEC (Chapter 1), Chief Technology
Officer_CTO, Digital Era Group, LLC,
Surfside, Fl. 33154
Christopher Day, CISSP, NSA:
IEM (Chapter 5), Senior Vice President,
Secure Information Systems, Terremark
Worldwide, Inc., 2 South Biscayne Blvd.,
Suite 2900, Miami, FL 33131
Scott R. Ellis, EnCE, RCA (Chapter 9),
Manager, Infrastructure Engineering
Team,kCura, Chicago, IL 60604
Errin W. Fulp (Chapter 6), Professor,
Department of Computer Science, Wake
Forest University, Winston-Salem, North
Carolina 27109
Yong Guan (Chapter 11), Litton Assistant
Professor, Department of Electrical and
Computer Engineering, Iowa State
University, Ames, Iowa 50011
Cem Gurkok (Chapter 10), Threat
Intelligence Development Manager,
Terremark, Worldwide, Inc., Miami,
Florida 33131
James T. Harmening (Chapter 2),
President, Computer Bits, Inc., Chicago,
Illinois 60602
Almantas Kakareka, CISSP, GSNA,
GSEC, CEH (Chapter 8), CTO, Demyo,
Inc., Sunny Isles Beach, Florida 33160
Bhushan Kapoor (Chapter 3), Chair,
Department of Information Systems and
Decision Sciences, California State
University, Fullerton, CA 92834
Jean-Marc Seigneur (Chapter 4),
Advanced Systems Group, University of
Geneva, Switzerland
xv
23. Introduction
This Managing Information Security
derivative book provides a broad overview
of information security program elements
to assist practitioners and IT professionals
in enhancing their skills and knowledge on
how to establish and implement an infor-
mation security program. The material in
this book can be referenced for general
information on a particular topic or can be
used in the decision-making process for
managing an information security program.
The purpose of this book is to inform infor-
mation security management practitioners
and IT professionals about various aspects
of information security that they will be
expected to implement and oversee in their
respective organizations. In addition, the
book provides guidance for facilitating a
more consistent approach to information
security programs.
Furthermore, this comprehensive book
serves as a professional reference to pro-
vide the most complete and concise view of
how to manage computer security and pri-
vacy available. It offers in-depth coverage
of computer security theory, technology,
and practice as it relates to established
technologies; as well as, recent advance-
ments. It explores practical solutions to a
wide range of security issues. Individual
chapters are authored by leading experts in
the field and address the immediate and
long term challenges in the contributors’
respective areas of expertise.
The book provides information that
practitioners and IT professionals can use
in building their information security
program strategy. In addition, new security
vendors are building Ethernet switches that
offer full security on every single port at
very affordable prices, driving prices down
and making competition fiercer for all inte-
grated security products.
The book is therefore useful to any man-
ager who requires a broad overview of
information security practices. In addition,
in this book, you will also learn how to:
1. Configure tools and utilities to
minimize exposure and detect
intrusions
2. Create, document and test continuity
arrangements for your organization
3. Perform a risk assessment and Business
Impact Assessment (BIA) to identify
vulnerabilities
4. Select and deploy an alternate site for
continuity of mission-critical activities
5. Identify appropriate strategies to
recover the infrastructure and processes
6. Organize and manage recovery teams
7. Test and maintain an effective recovery
plan in a rapidly changing technology
environment
8. Detect and respond to vulnerabilities
that put your organization at risk using
scanners
9. Employ real-world exploits and
evaluate their effect on your systems
10. Configure vulnerability scanners
11. Analyze the results of vulnerability
scans
12. Assess vulnerability alerts and
advisories
xvii
24. 13. Establish a strategy for vulnerability
management
14. Build a firewall to protect your network
15. Install and configure proxy-based and
stateful-filtering firewalls
16. Provide access to HTTP and FTP
services on the Internet
17. Implement publicly accessible servers
without compromising security
18. Protect internal IP addresses with NAT
and deploy a secure DNS architecture
19. Manage information security risks
within your organization
20. Identify security threats to your data
and IT infrastructure
21. Recognize appropriate technology to
deploy against these threats
22. Adapt your organization’s information
security policy to operational
requirements and assess compliance
23. Effectively communicate information
security issues
24. Oversee your organization’s ongoing
information security
You will also learn to identify vulner-
abilities and implement appropriate coun-
termeasures to prevent and mitigate threats
to your mission-critical processes. You will
learn techniques for creating a business
continuity plan (BCP) and the methodology
for building an infrastructure that supports
its effective implementation.
Knowledge of vulnerability assessment
and hacking techniques allows you to
detect vulnerabilities before your networks
are attacked. In this book, you will learn to
configure and use vulnerability scanners to
detect weaknesses and prevent network
exploitation. You will also acquire the
knowledge to assess the risk to your enter-
prise from an array of vulnerabilities and
to minimize your exposure to costly
threats.
The firewall has emerged as a primary
tool to prevent unauthorized access to valu-
able data. In this book, you will gain expe-
rience installing and configuring a firewall.
You will also learn how to allow access to
key services while maintaining your orga-
nization’s security.
Securing information is vital to the suc-
cess of every organization and is the link to
maximizing the benefits of information
technology. This book will empower man-
agers with an understanding of the threats
and risks to information resources. You
will also gain the knowledge of what needs
to be done to protect information infra-
structures, develop an action plan and
monitor threats. You will learn to identify
best practices and deploy a security pro-
gram throughout your organization.
Finally, throughout this book, you will
gain practical skills through a series of
interactive small-group workshops and
evolving case studies. You will also learn
how to design and develop a disaster
recovery plan, which includes the
following:
1. Assessing threats
2. Avoiding disasters
3. Identifying the impact on critical
business functions
4. Recognizing alternatives for continuing
business functions
5. Planning your continuity project
6. Organizing team structures for use in an
emergency
7. Creating a recovery plan from the
response to a disaster
In addition, this book is valuable for
those involved in selecting, implementing
or auditing secure solutions for access into
the enterprise. And, it is also valuable for
anyone responsible for ensuring the conti-
nuity of an organization’s critical systems
xviii INTRODUCTION
25. or processes. For example, the reader
should have general familiarity with- and
have knowledge equivalent to the
following:
• Project Management: Skills for Success
• Deploying Internet and Intranet
Firewalls
• Implementing Web Security
• Management Skills
• Influence Skills
• Project Risk Management
• Detecting and Analyzing Intrusions
• Vulnerability Assessment
• Disaster Recovery Planning
ORGANIZATION OF THIS BOOK
The book is composed of 11 contributed
chapters by leading experts in their fields.
Contributor Albert Caballero (Chapter 1,
“Information Security Essentials for IT
Managers: Protecting Mission-Critical
Systems”) begins by discussing how secu-
rity goes beyond technical controls and
encompasses people, technology, policy
and operations in a way that few other
business objectives do. Information security
involves the protection of organizational
assets from the disruption of business
operations, modification of sensitive data,
or disclosure of proprietary information.
The protection of this data is usually
described as maintaining the confidential-
ity, integrity, and availability (CIA) of the
organization’s assets, operations, and
information.
As identified throughout this chapter,
security goes beyond technical controls and
encompasses people, technology, policy,
and operations in a way that few other
business objectives do. The evolution of a
risk-based paradigm, as opposed to a
technical solution paradigm for security,
has made it clear that a secure organization
does not result from securing technical
infrastructure alone.
Next, contributor James T. Harmening
(Chapter 2, “Security Management
Systems”) examines documentation
requirements and maintaining an effective
security system; as well as, assessments.
Today, when most companies and govern-
ment agencies rely on computer networks
to store and manage their organizations’
data, it is essential that measures are put in
place to secure those networks and keep
them functioning optimally. Network
administrators need to define their security
management systems to cover all parts of
their computer and network resources.
A security management system starts as
a set of policies that dictate the way in
which computer resources can be used. The
policies are then implemented by the orga-
nization’s technical departments and
enforced. This can be easy for smaller orga-
nizations, but can require a team for larger
international organizations that have thou-
sands of business processes. Either way,
measures need to be put in place to pre-
vent, respond to, and fix security issues
that arise in your organization.
Then, contributors Rahul Bhasker and
Bhushan Kapoor (Chapter 3, “Information
Technology Security Management”) discuss
the processes that are supported with
enabling organizational structure and tech-
nology to protect an organization’s infor-
mation technology operations and
information technology assets against inter-
nal and external threats intentionally or
otherwise. Information technology security
management can be defined as processes
that supported enabling organizational
structure and technology to protect an
organization’s IT operations and assets
xix
INTRODUCTION
27. l'ingegno il rancore; queste non hanno mestieri d'aguzzarlo; la
finezza del senso è in loro una seconda natura.
Giunia Sillana aveva sorriso di quei sospetti, contenta che avessero
dato nel segno. Ma il console Sulpicio non ci aveva le stesse ragioni
di lei per lasciar correre, e fatto chiamare a sè l'argentario, gli aveva
data una strappazzata coi fiocchi. Badasse a' casi suoi, tenesse la
lingua tra i denti; se no, povero a lui! E il nostro Cepione,
quantunque di mala voglia, si era inchinato, aspettando il giorno
dell'udienza pretoria, a cui doveva presentarsi, in compagnia de' suoi
sozii, egli e loro con un pugno di mosche.
Or dunque, mentre il sapientissimo e santissimo uomo Marco Rutilio
Cordo stava sulla sua sedia curule, rendendo giustizia e
accomodando in bella guisa le pieghe della sua toga pretesta,
comparvero davanti al tribunale i tre usurai.
— Che cosa volete? — domandò.
— Pretore, ti chiediamo giustizia.
— Qui la si fa sempre, e per tutti. Di che vi lagnate?
— Del fatto che sai. Trenta giorni or sono, tu ci hai dato nelle mani il
nostro debitore Tizio Caio Sempronio....
— E fu bene, perchè egli non aveva pagato per intero il suo debito.
Lo avete portato via a buon dritto ed io spero che lo avrete nutrito
secondo la legge, o permesso che egli si nutrisse meglio, a sue
spese.
— Ah sì, egli s'è nutrito davvero; — gridò Crispo Lamia. — Lo stesso
giorno che tu ce lo hai consegnato, il prigioniero è fuggito.
— Fuggito?
— Sì; lo ignori tu forse, mentre tutta Roma lo sa?
— Cittadini, — rispose gravemente il magistrato, — io qui non debbo
sapere se non quello che consta al mio tribunale. Dunque, è fuggito?
E voi ve lo siete lasciato sguizzar di mano?
28. — Un tradimento! — urlò Cepione. — Un indegno tradimento! Egli
non può esser fuggito senza la connivenza di qualcheduno.
— Accusate, e vedremo; — disse il pretore.
— Ma.... — balbettò l'argentario, che rammentava la minaccia del
console, e voleva pur dire qualcosa; — i complici son troppo alti e
potenti. —
Marco Rutilio Cordo aggrottò le ciglia senz'altro.
— Non c'è nessuno troppo alto o possente, in Roma, davanti alla
maestà delle leggi. Parlate dunque, accusate liberamente. Vi avverto,
per altro, — soggiunse, con accento severo, — che le mezze accuse
non giovano, ed io vi farei costar care le false. —
Cepione, inviperito, voleva replicare. Ma i suoi colleghi, più prudenti,
lo tirarono per un lembo della toga.
— Non mettere te e noi in un ginepraio, — gli bisbigliarono
all'orecchio. — Tu lo vedi; il pretore non ischerza. —
Cepione li chetò con un gesto della mano, che voleva dire: ho capito.
E abbassando il tono, ripigliò:
— Ma il nostro credito, chi ce lo paga? Che cosa ci rimane, se il
debitore è sfumato? Il suo nome nella tua sentenza! In verità, è
troppo poco.
— Non dico di no; rispose Rutilio Cordo, soddisfatto di vederli calare.
— Ma non son io che vi ho fatto perdere il pegno. E proprio volevate
farlo in tre pezzi?
— In tre pezzi, sì, in tre pezzi, come ci consentono le patrie leggi.
— E sia; lo potete. Spartitevi quel che rimane, senza pregiudizio del
vostro diritto su tutto quel più che potrà ritornarvi in balìa. A te,
Crispo Lamia, sérviti pel primo, quantunque tu non sia il maggior
creditore, ed abbi Tizio, il prenome. A te, Servilio Cepione, prenditi
Caio, il nome gentilizio. E tu, Furio Spongia, abbi quel che rimane,
Sempronio, il cognome della famiglia. Lo volevate dividere in tre; vi
accordo il taglio, vi assegno le porzioni; non se ne parli più altro. —
29. Così nella sua alta sapienza Marco Rutilio Cordo, che qualche volta
amava far la burletta, vizio che è rimasto e s'è perpetuato presso
tutti i giudici della terra, a rendere manco noiose le lunghe ore
d'udienza!
Una risata omerica di tutti gli astanti accolse la sentenza del pretore.
Quando la voce fu passata di fila in fila, per modo che ne fossero
informati i più lontani, fu uno scoppio d'ilarità in tutto il Foro; ilarità
che si propagò per tutte le vie, per tutti i chiassi dell'eterna città. Le
aquile e i corvi, frequentatori assidui dei sette colli, passando a volo
sulle mura di Romolo, in quel momento d'epica giocondità, rimasero
un pezzo a becco aperto, domandando tra sè per qual ragione fosse
uscito dalla sua serietà il popolo più grave e più contegnoso dei
mondo.
La sentenza di Marco Rutilio Cordo, buttata là senza pretensione e
così per mandare a spasso quei tre noiosi argentarii, trovò i suoi
lodatori, e passò in proverbio la divisione di un nome in tre parti.
Tizio Caio e Sempronio restarono separati e per sempre. I nomi
d'Aulo, di Nigidio, ed altri, che erano serviti fino allora ai
giureconsulti nel proporre gli esempi, cedettero il luogo a quei tre.
Tizio ha dato a Caio; Caio ha negato a Sempronio; e avanti di questo
passo, fino al tempo nostro, che tramanderà l'usanza ai venturi.
Lettori dell'anima mia, vi ho chiarito un passo d'archeologia romana,
e voi siete capaci, non che di rendermi grazie, di non prestar fede
alle mie trovate. Questa è la sorte di tutti i grandi scopritori, ed io mi
rassegno.
Ma voi siete anche capaci di chiedermi come e dove andasse a finire
il giovinetto, a cui era toccata quella burlesca diminutio capitis. Ed
ecco, è per l'appunto quello che ignoro. Ho rovistato in tutti i
bugigattoli della storia, e non ho trovato un bel nulla.
Leggo cionondimeno in Plutarco, nella vita di Elvio Sillano (quel
valentuomo che sapete, e reputato degno di entrare in paragone con
un eroe della Grecia), che la bella Giunia Sillana era molto tranquilla.
30. Segno evidente che l'amico doveva star bene e che si adattava di
buona voglia alla necessità di conservare l'incognito.
Un giorno, la bella pallidona s'imbattè in Clodia Metella. Le due
matrone non si erano più visitate, nè incontrate per via, dopo la
stagione delle bagnature nel golfo di Neapoli.
Giunia Sillana fece le viste di non riconoscerla. Ma l'altra le andò
incontro difilata, e col più amabile dei sorrisi sul labbro. Dicono i
pratici che le signore donne ci abbiano sempre questo sorriso in
mostra, quando si dispongono a dare una stoccatina a qualche
amica del cuore.
— Oh, bellissima, — gridò Clodia Metella, prendendo amorevolmente
le mani dell'amica, — come stai? Non ti si vede più.
— Sto bene e tu mi vedi; — rispose asciuttamente Giunia Sillana.
— Ah sì, una volta all'anno! Beato chi ti possiede! Dimmi, a
proposito, che cos'è avvenuto di quel leggiadro cavaliere?.....
— Di che cavaliere mi parli? — chiese Giunia Sillana, seccata
dall'intenzione sarcastica di quel modo avverbiale che aveva usato
Clodia Metella.
— Di Tizio Caio Sempronio, poichè bisogna dir proprio il suo nome.
Dicono che sia andato all'esercito di Cesare.
— Sarà vero.
— Ma dicono altresì che non sia uscito di Roma e che viva nascosto
in una tua villa.
— Sarà vero anche questo. —
Tanta imperturbabilità era piuttosto singolare, e Clodia si morse le
labbra dal dispetto.
— Dunque, mia bellissima, tu conservi il segreto. Non ci sarà verso
di cavarti nulla di bocca?
— Perchè dici questo? Ho anzi un'imbasciata per te; — rispose
Giunia Sillana.
31. — Da lui?
— Sicuramente, da lui.
— Oh Venere madre! e sei stata così buona....
— Da incaricarmene, certamente. Povero giovane, è così gentile
d'animo e memore delle sue vecchie amicizie! Egli m'ha detto di
consigliarti in suo nome l'uso quotidiano e abbondante dell'acqua di
Cosmo. Servilio Cepione si lava così poco, e lascia un odore così
cattivo su tutto ciò ch'egli tocca! —
La botta era andata al cuore. Clodia Metella perdette il lume degli
occhi.
— Mi pagherai questo affronto, faccia di verderame! — sibilò essa,
con voce soffocata dalla rabbia.
Giunia Sillana non si commosse punto, nè alla minaccia, nè
all'insulto.
— Io non ti temo; — rispose; — tutta Roma sa chi tu sei,
quadrantaria! Del resto meglio esser verdi, che impiastricciate di
medicamenti letali. Si narra che Metello Celere, il tuo povero marito,
per averti baciata sulle guance, sia morto. —
In questa guisa le due matrone si separarono, sorridendosi a
vicenda, mentre i loro servi si tenevano ad una rispettosa distanza.
Giunia Sillana non aveva certamente a temer nulla dallo sdegno di
Clodia. Elvio Sillano era del partito di Cesare, che trionfava, e Clodia
Metella doveva appiccar la voglia all'arpione. Del resto, era andata
maledettamente giù, la quadrantaria. E vennero presto le rughe e si
dileguarono ad uno ad uno gli amanti.
Servilio Cepione, sempre più adiposo e rosso scarlatto nel grugno
come i bargigli d'un tacchino, un bel dì fu trovato morto nel suo
letto. Quella volta gli era capitato per davvero, e furono esauditi i
voti ardentissimi di tanti cittadini, che glieli auguravano a secco. I
suoi colleghi delle Botteghe Vecchie gli fecero un funerale magnifico,
accompagnato dalle imprecazioni di tutti i sette colli. Ma pur troppo,
32. nella fretta, dimenticarono di mettergli in bocca la moneta per
pagare il suo passaggio a Caronte, ed io credo che il mascalzone,
con tutte le sue ricchezze, non abbia ancora potuto mettersi in
barca.
Mi domanderete di Cinzio Numeriano. Il bel poeta non fece più versi,
che raccomandassero il suo nome alla posterità. Dopo tante liete
impromesse! Ma pur troppo è così; la Musa non vuol rivali, e pianta
lì, senza tanti complimenti, chi non sa essere tutto per lei. E un bel
giorno lo piantò anche Delia, fuggendo in Ispagna con un
pantomimo famoso.
Giunio Ventidio, Postumio Floro, Elio Vibenna.... Io spero, o lettori,
che non mi domanderete notizia di tutte queste parti secondarie.
Sappiate del resto, che uno dopo l'altro morirono tutti. E, senza
mestieri di appurare il fatto con l'Arte di verificare le date, ho ragione
di credere che sia morto anche il leggiadro eroe della mia storia,
mezzo romana e mezzo di tutti i tempi e di tutti i paesi.
Se vi ha divertiti, ditelo; ma per carità non la date ad imprestito.
Oltre che gli amici non vi restituirebbero il libro, voi fareste un danno
all'editore.
Se poi v'ha annoiati, come temo, state zitti, per l'amor di Dio, e
pensate che anche alle manifatture di questa sorte va applicato il
proverbio: non tutte le ciambelle riescono col buco.
FINE.
34. INDICE
Capitolo I. Entra in scena l'eroe Pag. 1
» II. Il triclinio 9
» III. Donne, vino e canzoni 21
» IV. L'amico ei conosce alla prova 34
» V. Amore è cieco 48
» VI. Rose e spine 65
» VII. Venere spogliatrice 83
» VIII. L'attesa 103
» IX. Duettino d'amore 116
» X. Il terzo incomodo 130
» XI. Il prodigo e l'avaro 139
» XII. Nel teatro di Pompeo 152
» XIII. Amori in vista 162
» XIV. Le nozze di Numeriano 180
» XV. Il ricevimento 197
» XVI. Quod erat in fatis 206
» XVII. Viaggio a Citera 219
» XVIII. Luci ed ombre 231
» XIX. Siamo agli sgoccioli 251
» XX. Una va e l'altra viene 268
» XXI. Pro tribunali 279
» XXII. Sulle ventitrè e tre quarti 292
» XXIII. Dopo la sentenza 305
» XXIV. Un colpo di mano 313
» XXV. Chi ha avuto ha avuto 325
35. DELLO STESSO AUTORE
(Edizioni in-16).
Racconti e novelle (1809). Nuova
edizione in-16:
Vol. I: Capitan Dodero, Santa
Cecilia, Una notte bizzarra L. 2 —
Vol. II: L'Olmo e l'Edera, Il libro
nero 3 —
I Rossi e i Neri (1871). Due volumi 7 —
Val d'Olivi (1873). Seconda
edizione 2 —
Le confessioni di Fra Gualberto
(1873). Seconda edizione 3 —
Semiramide, racconto babilonese
(1873). Seconda ediz. 3 —
La legge Oppia, commedia (1874) 1 —
Castel Gavone (1875). Seconda
edizione 2 50
Come un sogno (1875). Quarta
edizione 2 —
La notte del commendatore (1875) 4 —
Diana degli Embriaci (1877) 3 —
Cuor di ferro e cuor d'oro (1877).
Seconda edizione 5 —
Lutezia (1878). Seconda edizione 2 —
La conquista d'Alessandro (1879) 4 —
(Edizioni in-32).
36. Capitan Dodero. Terza edizione L. — 50
Santa Cecilia. Due volumi. Terza
edizione 1 —
L'Olmo e l'Edera. Due volumi.
Terza edizione 1 —
Il libro nero. Due volumi. Terza
edizione 1 —
37. Nota del Trascrittore
Ortografia e punteggiatura originali sono state
mantenute, correggendo senza annotazione minimi errori
tipografici.
38. *** END OF THE PROJECT GUTENBERG EBOOK TIZIO CAIO
SEMPRONIO: STORIA MEZZO ROMANA ***
Updated editions will replace the previous one—the old editions
will be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.
START: FULL LICENSE
40. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the
free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only
be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
41. 1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E. Unless you have removed all references to Project
Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
42. Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is
posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files
43. containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or
providing access to or distributing Project Gutenberg™
electronic works provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
44. payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project
Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
45. law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except
for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
46. If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.
Section 2. Information about the Mission
of Project Gutenberg™
47. Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.
The Foundation’s business office is located at 809 North 1500
West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
48. Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws
regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states
where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot
make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.
Please check the Project Gutenberg web pages for current
donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
49. credit card donations. To donate, please visit:
www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.
Project Gutenberg™ eBooks are often created from several
printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
50. Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com