This document discusses the application of logic to computer security. It covers several approaches used in logic for computer security like model checking, inductive proofs, type theory, SAT, and SMT solving. It also discusses applications of logic to security protocols, operating system security, and software model checking. Finally, it discusses some specialized logics used for computer security like linear logic and separation logic.