book.bib

@book{kent.millett:who,
  editor = {Stephen T. Kent and Lynette I. Millett},
  organization = {Committee on Authentication Technologies and Their Privacy
		  Implications, National Research Council},
  otherauth = {Bellovin},
  publisher = {National Academies Press},
  title = {Who Goes There? Authentication Through the Lens of
		  Privacy},
  url = {http://www.nap.edu/catalog/10656.html},
  year = 2003,
  bdsk-url-1 = {http://www.nap.edu/catalog/10656.html}
}
@book{:making,
  organization = {Committee on Science and Technology for Countering
		  Terrorism, National Research Council},
  otherauth = {Bellovin},
  publisher = {National Academies Press},
  title = {Making the Nation Safer: The Role of Science and
		  Technology in Countering Terrorism},
  url = {http://www.nap.edu/catalog.php?record_id=10415},
  year = 2002,
  bdsk-url-1 = {http://www.nap.edu/catalog.php?record_id=10415}
}
@book{hennessy.patterson.ea:information,
  editor = {John L. Hennessy and David A. Patterson and Herbert S.
		  Lin},
  otherauth = {Bellovin},
  publisher = {National Academies Press},
  title = {Information Technology for Counterterrorism: Immediate
		  Actions and Future Possibilities},
  url = {http://www.nap.edu/catalog/10640.html},
  year = 2003,
  bdsk-url-1 = {http://www.nap.edu/catalog/10640.html}
}
@inbook{tucker:network,
  booktitle = {{CRC} Computer Science and Engineering Handbook},
  editor = {A. Tucker},
  otherauth = {Bellovin},
  publisher = {{CRC} Press},
  title = {Network Security Issues},
  url = {http://www.crcpress.com/product/isbn/9781584883609},
  year = 1996,
  bdsk-url-1 = {http://www.crcpress.com/product/isbn/9781584883609}
}
@inbook{denning.denning:network,
  booktitle = {Internet Besieged: Countering Cyberspace Scofflaws},
  editor = {Peter Denning and Dorothy Denning},
  otherauth = {Bellovin},
  publisher = {{ACM} Press},
  title = {Network Security Issues},
  year = 1997
}
@book{cheswick.bellovin:firewalls,
  address = {Reading, MA},
  author = {William R. Cheswick and Steven M. Bellovin},
  edition = {First},
  publisher = {Addison-Wesley},
  smb-major = {yes},
  title = {Firewalls and Internet Security: Repelling the Wily
		  Hacker},
  url = {http://www.wilyhacker.com/1e/},
  year = {1994},
  bdsk-url-1 = {http://www.wilyhacker.com/1e/}
}
@book{cheswick.bellovin.ea:firewalls,
  address = {Reading, MA},
  author = {William R. Cheswick and Steven M. Bellovin and Aviel D.
		  Rubin},
  edition = {Second},
  publisher = {Addison-Wesley},
  smb-major = {yes},
  title = {Firewalls and Internet Security; Repelling the Wily
		  Hacker},
  url = {http://www.wilyhacker.com/},
  year = {2003},
  bdsk-url-1 = {http://www.wilyhacker.com/}
}
@book{kent.millett:ids-not,
  editor = {Stephen T. Kent and Lynette I. Millett},
  organization = {Committee on Authentication Technologies and Their Privacy
		  Implications, National Research Council},
  otherauth = {Bellovin},
  publisher = {National Academies Press},
  title = {{IDs}---Not That Easy: Questions About Nationwide Identity
		  Systems},
  url = {http://books.nap.edu/catalog.php?record_id=10346},
  year = 2002,
  bdsk-url-1 = {http://books.nap.edu/catalog.php?record_id=10346}
}
@inbook{krishnamurthy:security,
  booktitle = {Practical Reusable UNIX Software},
  editor = {B. Krishnamurthy},
  otherauth = {Bellovin},
  publisher = {John Wiley \& Sons},
  title = {Security and Software Engineering},
  url = {http://www.research.att.com/~gsf/publications/prus-1995-1.pdf},
  year = 1995,
  bdsk-url-1 = {http://www.research.att.com/~gsf/publications/prus-1995-1.pdf}
}
@book{schneider:trust,
  editor = {Fred B. Schneider},
  otherauth = {Bellovin},
  publisher = {National Academy Press},
  title = {Trust in Cyberspace},
  url = {http://www.nap.edu/openbook.php?record_id=6161},
  year = 1999,
  bdsk-url-1 = {http://www.nap.edu/openbook.php?record_id=6161}
}
@book{goodman.lin:toward,
  editor = {Seymour E. Goodman and Herbert S. Lin},
  otherauth = {Bellovin},
  publisher = {National Academy Press},
  title = {Toward a Safer and More Secure Cyberspace},
  url = {http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf},
  year = 2007,
  bdsk-url-1 = {http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf}
}
@book{stolfo.bellovin.ea:insider,
  editor = {Salvatore Stolfo and Steven M. Bellovin and Angelos D.
		  Keromytis and Sara Sinclair and Sean Smith and Shlomo
		  Hershkop},
  publisher = {Springer},
  title = {Insider Attack and Cyber Security: Beyond the Hacker
		  (Advances in Information Security)},
  url = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6},
  year = 2008,
  bdsk-url-1 = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-77321-6}
}