%PDF-1.4 % 10 0 obj << /S /GoTo /D (Outline0.1) >> endobj 13 0 obj (Introduction to Isabelle/HOL) endobj 14 0 obj << /S /GoTo /D (Outline0.1.1.6) >> endobj 17 0 obj (PL, FOL, HOL) endobj 18 0 obj << /S /GoTo /D (Outline0.1.2.8) >> endobj 21 0 obj (Isabelle/HOL) endobj 22 0 obj << /S /GoTo /D (Outline0.2) >> endobj 25 0 obj (Types \046 Functional Programming) endobj 26 0 obj << /S /GoTo /D (Outline0.3) >> endobj 29 0 obj (Modeling Firewalls) endobj 30 0 obj << /S /GoTo /D (Outline0.3.1.25) >> endobj 33 0 obj (Introduction) endobj 34 0 obj << /S /GoTo /D (Outline0.3.2.29) >> endobj 37 0 obj (Syntax) endobj 38 0 obj << /S /GoTo /D (Outline0.3.3.38) >> endobj 41 0 obj (Semantics) endobj 42 0 obj << /S /GoTo /D (Outline0.4) >> endobj 45 0 obj (Induction) endobj 46 0 obj << /S /GoTo /D (Outline0.5) >> endobj 49 0 obj (Analyzing the Firewall Model) endobj 50 0 obj << /S /GoTo /D (Outline0.6) >> endobj 53 0 obj (Analyzing Rule Sets) endobj 54 0 obj << /S /GoTo /D (Outline0.7) >> endobj 57 0 obj (Rule Lists) endobj 58 0 obj << /S /GoTo /D (Outline0.8) >> endobj 61 0 obj (Conclusion) endobj 62 0 obj << /S /GoTo /D [63 0 R /Fit] >> endobj 65 0 obj << /Length 1258 /Filter /FlateDecode >> stream xXKs7W(t|nomR;NR^TyeX^5+#kvKƞ GU_o{ >EĽ2qI+иq nIg%&v괳3ЮE Ʉ%hf.i
?A027lt~SڋRv{&H]N,02mxv텃7,!ʽϝ'Ůog
H[7VS+yHx6b3{d+!duclm*
GMOI s}ncV
~m5Kuދ#"9t+v>fD(4fCh`Dx.߄.'9p[p18.p\<%u#zRJgajEy%HxMD| IѤ*I^ U^[.?QU~f3t~{JRcǿ\*^x4Bf9%@Bئ$ I\"5_IHͭvZ)˭~sȹe) (ٚKT#@(oD[%
j#ڜLlcLXou=jZXjLYFQ1yW^vpgW=Ͽj Ŏ;sAuZfi/VXDX.B4Rg
eh3:X J[
-G
U*E%5U:C
^鳋bZVBgZ:GI;(DW6n6[
f̛l܌Ge]дnibUj|_tZx˻<,>=LKm4m|\
oq?R|وc