book.bib
@incollection{bellovin.landau.ea:limiting,
address = {Washington, DC},
author = {Steven M. Bellovin and Susan Landau and Herbert S. Lin},
booktitle = {Bytes, Bombs, and Spies: The Strategic Dimensions of
Offensive Cyber Operations},
date-added = {2018-12-17 18:51:08 -0500},
date-modified = {2018-12-17 23:00:26 -0500},
editor = {Herbert Lin and Amy Zegart},
pages = {265--288},
publisher = {Brookings Institution Press},
title = {Limiting the Undesired Impact of Cyber Weapons: Technical
Requirements and Policy Implications},
url = {https://www.brookings.edu/book/bytes-bombs-and-spies/},
year = {2018},
bdsk-url-1 = {https://academic.oup.com/cybersecurity/article/3/1/59/3097802/Limiting-the-undesired-impact-of-cyber-weapons}
}
@book{bellovin:thinking,
address = {Boston},
author = {Steven M. Bellovin},
date-added = {2015-09-01 13:38:46 +0000},
date-modified = {2018-07-10 12:21:21 +0000},
isbn = {978-0-13-427754-7},
publisher = {Addison-Wesley},
shorttitle = {Thinking Security},
title = {Thinking Security: Stopping Next Year's Hackers},
url = {http://www.informit.com/store/thinking-security-stopping-next-years-hackers-9780134277547},
year = {2016},
bdsk-url-1 = {http://www.informit.com/store/thinking-security-stopping-next-years-hackers-9780134277547}
}
@incollection{tucker:network,
booktitle = {{CRC} Computer Science and Engineering Handbook},
editor = {A. Tucker},
otherauth = {Bellovin},
publisher = {{CRC} Press},
title = {Network Security Issues},
url = {http://www.crcpress.com/product/isbn/9781584883609},
year = {1996},
bdsk-url-1 = {http://www.crcpress.com/product/isbn/9781584883609}
}
@incollection{denning.denning:network,
booktitle = {Internet Besieged: Countering Cyberspace Scofflaws},
editor = {Peter Denning and Dorothy Denning},
otherauth = {Bellovin},
publisher = {{ACM} Press},
title = {Network Security Issues},
year = {1997}
}
@book{cheswick.bellovin:firewalls,
address = {Reading, MA},
author = {William R. Cheswick and Steven M. Bellovin},
date-modified = {2020-12-15 14:06:58 -0500},
edition = {1st edition},
isbn = {0201633574},
publisher = {Addison-Wesley},
shorttitle = {Firewalls and Internet Security},
title = {Firewalls and Internet Security: Repelling the Wily
Hacker},
url = {https://www.wilyhacker.com/1e/},
year = {1994},
bdsk-url-1 = {https://www.wilyhacker.com/1e/}
}
@book{cheswick.bellovin.ea:firewalls,
address = {Reading, MA},
author = {William R. Cheswick and Steven M. Bellovin and Aviel D.
Rubin},
date-modified = {2022-04-03 18:22:52 -0400},
edition = {second},
isbn = {078-5342634662},
publisher = {Addison-Wesley},
title = {Firewalls and Internet Security: Repelling the Wily
Hacker},
url = {https://www.wilyhacker.com/},
year = {2003},
bdsk-url-1 = {https://www.wilyhacker.com/}
}
@book{stolfo.bellovin.ea:insider,
editor = {Salvatore Stolfo and Steven M. Bellovin and Angelos D.
Keromytis and Sara Sinclair and Sean Smith and Shlomo
Hershkop},
publisher = {Springer},
title = {Insider Attack and Cyber Security: Beyond the Hacker
(Advances in Information Security)},
url = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6},
year = {2008},
bdsk-url-1 = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6}
}
@incollection{krishnamurthy:security,
booktitle = {Practical Reusable UNIX Software},
editor = {B. Krishnamurthy},
otherauth = {Bellovin},
publisher = {John Wiley \& Sons},
title = {Security and Software Engineering},
url = {http://www.research.att.com/~gsf/publications/prus-1995-1.pdf},
year = {1995},
bdsk-url-1 = {https://dl.acm.org/citation.cfm?id=242091&picked=prox}
}