So I decided to get a refresher on kerberos..
Here is a snippet from Shon's AIO (Brand new 7th edition). It is the very first step for Kerberos, I'll change the names to protect the innocent
Suzee comes in to work and enters her username and password into her workstation at 8:00 A.M.The Kerberos software on Suzee’s computer sends the username to the authentication service (AS) on the KDC, which in turn sends Suzee a ticket granting ticket (TGT) that is encrypted with the TGS's secret key.
If Suzee has entered her correct password, then this TGT is decrypted and Suzee gains access to her local workstation desktop.
Anyone see anything wrong with this?
Here's the snippet from Shon's 6th edition, different user 
Donna comes in to work and enters her username and password into her workstation at 8:00 A.M.
The Kerberos software on Donna’s computer sends the username to the authentication service (AS) on the KDC, which in turn sends Donna a ticket granting ticket (TGT) that is encrypted with Donna’s password (secret key).
If Donna has entered her correct password, then this TGT is decrypted and Donna gains access to her local workstation desktop.
How in the H.E double hockey stick does something like that get published in the latest edition? If someone was trying to learn kerberos and they read the 7th edition they would (and should) be totally confused as to how Suzee can decrypt the TGT if it is encrypted with the TGS's secret key... my gawd!!!