book.bib

@incollection{bellovin.landau.ea:limiting,
  address = {Washington, DC},
  author = {Steven M. Bellovin and Susan Landau and Herbert S. Lin},
  booktitle = {Bytes, Bombs, and Spies: The Strategic Dimensions of
		  Offensive Cyber Operations},
  date-added = {2018-12-17 18:51:08 -0500},
  date-modified = {2018-12-17 23:00:26 -0500},
  editor = {Herbert Lin and Amy Zegart},
  pages = {265--288},
  publisher = {Brookings Institution Press},
  title = {Limiting the Undesired Impact of Cyber Weapons: Technical
		  Requirements and Policy Implications},
  url = {https://www.brookings.edu/book/bytes-bombs-and-spies/},
  year = {2018},
  bdsk-url-1 = {https://academic.oup.com/cybersecurity/article/3/1/59/3097802/Limiting-the-undesired-impact-of-cyber-weapons}
}
@book{bellovin:thinking,
  address = {Boston},
  author = {Steven M. Bellovin},
  date-added = {2015-09-01 13:38:46 +0000},
  date-modified = {2018-07-10 12:21:21 +0000},
  isbn = {978-0-13-427754-7},
  publisher = {Addison-Wesley},
  shorttitle = {Thinking Security},
  title = {Thinking Security: Stopping Next Year's Hackers},
  url = {http://www.informit.com/store/thinking-security-stopping-next-years-hackers-9780134277547},
  year = {2016},
  bdsk-url-1 = {http://www.informit.com/store/thinking-security-stopping-next-years-hackers-9780134277547}
}
@incollection{tucker:network,
  booktitle = {{CRC} Computer Science and Engineering Handbook},
  editor = {A. Tucker},
  otherauth = {Bellovin},
  publisher = {{CRC} Press},
  title = {Network Security Issues},
  url = {http://www.crcpress.com/product/isbn/9781584883609},
  year = {1996},
  bdsk-url-1 = {http://www.crcpress.com/product/isbn/9781584883609}
}
@incollection{denning.denning:network,
  booktitle = {Internet Besieged: Countering Cyberspace Scofflaws},
  editor = {Peter Denning and Dorothy Denning},
  otherauth = {Bellovin},
  publisher = {{ACM} Press},
  title = {Network Security Issues},
  year = {1997}
}
@book{cheswick.bellovin:firewalls,
  address = {Reading, MA},
  author = {William R. Cheswick and Steven M. Bellovin},
  date-modified = {2020-12-15 14:06:58 -0500},
  edition = {1st edition},
  isbn = {0201633574},
  publisher = {Addison-Wesley},
  shorttitle = {Firewalls and Internet Security},
  title = {Firewalls and Internet Security: Repelling the Wily
		  Hacker},
  url = {https://www.wilyhacker.com/1e/},
  year = {1994},
  bdsk-url-1 = {https://www.wilyhacker.com/1e/}
}
@book{cheswick.bellovin.ea:firewalls,
  address = {Reading, MA},
  author = {William R. Cheswick and Steven M. Bellovin and Aviel D.
		  Rubin},
  date-modified = {2022-04-03 18:22:52 -0400},
  edition = {second},
  isbn = {078-5342634662},
  publisher = {Addison-Wesley},
  title = {Firewalls and Internet Security: Repelling the Wily
		  Hacker},
  url = {https://www.wilyhacker.com/},
  year = {2003},
  bdsk-url-1 = {https://www.wilyhacker.com/}
}
@book{stolfo.bellovin.ea:insider,
  editor = {Salvatore Stolfo and Steven M. Bellovin and Angelos D.
		  Keromytis and Sara Sinclair and Sean Smith and Shlomo
		  Hershkop},
  publisher = {Springer},
  title = {Insider Attack and Cyber Security: Beyond the Hacker
		  (Advances in Information Security)},
  url = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6},
  year = {2008},
  bdsk-url-1 = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6}
}
@incollection{krishnamurthy:security,
  booktitle = {Practical Reusable UNIX Software},
  editor = {B. Krishnamurthy},
  otherauth = {Bellovin},
  publisher = {John Wiley \& Sons},
  title = {Security and Software Engineering},
  url = {http://www.research.att.com/~gsf/publications/prus-1995-1.pdf},
  year = {1995},
  bdsk-url-1 = {https://dl.acm.org/citation.cfm?id=242091&picked=prox}
}