Computing Game-Theoretic Solutions and Applications to Security