%
% Copyright (C) Håkan Lindqvist 2006, 2007.
% May be copied freely for educational and personal use. Any other use
% needs my written consent (i.e. no commercial use without my approval).
%
\documentclass[a4paper]{book}

\usepackage[T1]{fontenc}
%\usepackage[swedish]{babel}
\usepackage{graphicx, fancyheadings}
\usepackage{moreverb, latexsym, amssymb, amsfonts, multicol}
\usepackage{times}
\addtolength{\textheight}{20mm}
\addtolength{\topmargin}{-20mm}

% Handy to activate when reviewing a lot of definitions.
%\usepackage{showlabels}

% For placing the cover artwork.
\usepackage[absolute]{textpos}
\textblockorigin{0mm}{0mm}
\setlength{\TPHorizModule}{210mm}
\setlength{\TPVertModule}{297mm}
\setlength{\parindent}{0pt}

% Index construction
\usepackage{makeidx}
\makeindex


\newtheorem{theorem}{Theorem}[section]
\newtheorem{definition}{Definition}[section]
\newtheorem{unnamed}{}[section]
\newtheorem{policyrule}{Rule}[section]
\newtheorem{policyoperation}{Operation}[section]
\newtheorem{example}{Example}[section]

% Setup pdflatex enviroment nicely.
\usepackage{hyperref}
\hypersetup{bookmarks=true,%
    colorlinks=true,%
    citecolor=red,%
    filecolor=black,%
    linkcolor=red,%
    urlcolor=blue,%
    plainpages=false,%
    pdfauthor={Håkan Lindqvist},%   
    pdftitle={The Policy Tool Handbook}}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{document}
\pagestyle{empty}

\begin{textblock}{1}(0,0)
   \begin{figure}
     \begin{center}
     % \marginwidth=106pt -> pos minus that
     % Use: http://nxg.me.uk/dist/textpos/
     \includegraphics{images/frontpage_mon.png}
     \end{center}
   \end{figure}
\end{textblock}

\verb+ +
\newpage

\title{{\Huge The Policy Tool Suite Handbook}}
\author{H\aa{}kan Lindvist \\%
        \href{mailto:lindqvist.home@gmail.com}{lindqvist.home@gmail.com}}

\maketitle
\cleardoublepage

\pagenumbering{roman} \setcounter{page}{1}
\pagestyle{myheadings}
\markboth{Policytool Handbook}{Policytool Handbook}

\cleardoublepage

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\verb+ +

\vspace{35mm}

\pagestyle{empty}
\textit{\Large To my wonderful fiancee; nothing would be possible without you.}

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

\cleardoublepage

% Add the table of contents
\tableofcontents%
\cleardoublepage

%List of figures and List of tables 
\listoffigures
%\listoftables
\cleardoublepage

% Count pages from a sane number.
\pagenumbering{arabic} \setcounter{page}{1}

%%%%%%%%%%% Part I graphics
\verb+ +
% Add nice graphics to indicate the first trivial chapters.
\addcontentsline{toc}{chapter}{Part I -- The Beginning}
\begin{textblock}{1}(0,0)
   \begin{figure}
     \begin{center}
     % Use: http://nxg.me.uk/dist/textpos/
     \includegraphics{images/partone.png}
     \end{center}
   \end{figure}
\end{textblock}

\vspace{180mm}

\begin{center}
{\setlength{\baselineskip}{1.2\baselineskip}
{\it \large
I will begin this handbook with the copyright notices and some triva;
information about the making of this handbook.

Then follows a chapter that about and what may be accomplished using the
information conveyed in this handbook. It provides a good insight into
why computer security is ultimately flawed as it is today.

The last chapter of the first part features introductory logic and set
theory that you may wish to review. The chapter also presents lattices,
which you will need to have a basic understanding of to fully grasp
implications of the models discussed in later chapters.
} \par}
\end{center}



%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Legal and contact}
\pagestyle{myheadings}

\input{copyright.tex}

\input{contact.tex}

\input{resources.tex}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Credits and Trivia}

\input{credits.tex}
\input{trivia.tex}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{The problem and parts of its possible solution}
\input{problem.tex}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Logic and set theory}
\input{discrete_mathematics.tex}


%%%%%%%%%%% Part II graphics
% Add nice graphics to indicate the important theoretical chapters.
\cleardoublepage
\pagestyle{empty}
\verb+ + 
\addcontentsline{toc}{chapter}{Part II -- Foundations}
\begin{textblock}{1}(0,0)
   \begin{figure}
     \begin{center}
     % Use: http://nxg.me.uk/dist/textpos/
     \includegraphics{images/parttwo.png}
     \end{center}
   \end{figure}
\end{textblock}

\vspace{180mm}

\begin{center}
{\setlength{\baselineskip}{1.2\baselineskip}
{\it \large
The following chapters introduces some of the fundamental parts of
security theory. The first chapters provides definitions of the
components, the principals, of a security system. Properties that are
intimately related to security is presented, including issues such as
integrity and trust. The important issue of how when a system is
considered secure is elaborated upon.

Then follows two important chapters. One that presents access control,
what types there are and their implications, and another that
extensively discusses security policies.
} \par}
\end{center}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Definitions and foundations of computer security}
\pagestyle{myheadings}
\input{basic_definitions_computer_security.tex}
\newpage
\input{tcb.tex}
\input{defining_secure_systems.tex}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Access Control}
\input{access_control.tex}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{Security Policies}
\input{security_policies.tex} 


%%%%%%%%%%% Part III graphics
% Add nice graphics to indicate the algebra chapter.
\cleardoublepage
\pagestyle{empty}
\verb+ + 
\addcontentsline{toc}{chapter}{Part III -- The Algebra}
\begin{textblock}{1}(0,0)
   \begin{figure}
     \begin{center}
     % Use: http://nxg.me.uk/dist/textpos/
     \includegraphics{images/partthree.png}
     \end{center}
   \end{figure}
\end{textblock}

\vspace{180mm}

\begin{center}
{\setlength{\baselineskip}{1.2\baselineskip}
{\it \large
The following chapter will present an algebra that will prove to be
powerful enough to express consistent security policies of arbitrary
complexity. The algebra also supports the important operation of
combining policies into one unified policy that complies with all of
the (partial) policies that are being combined.
} \par}
\end{center}


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\chapter{A common security policy algebra}
\pagestyle{myheadings}
\input{algebra.tex} % indexing here


\cleardoublepage
\addcontentsline{toc}{chapter}{References}
\renewcommand{\bibname}{References}
\bibliographystyle{alpha}
\bibliography{handbook}

\cleardoublepage
% Pun intended ;-)
\index{recurse|see{recursive}}
\index{recursive|see{recurse}}
\printindex

\appendix


\end{document}
