About the Author.
5. Vulnerability Analysis.
6. Risk Analysis.
"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)
- Applies network theory, optimization theory, and simulation software to analyze and understand how various infrastructure sectors evolve, what makes them vulnerable, and how they can be harden
- Emphasizes the development of policies that lead to successful prevention of terrorist attacks on the nation’s infrastructure
- Substitutes scientific methods for subjective experience in the process of assessing infrastructure risks
- Reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes
- Solves one of the primary problems of critical infrastructure protection – the problem of enormous size and complexity
- Provides a comprehensive approach to analysis, assessment, and risk reduction to help the policy-maker decide how best to allocate limited funds to prevent successful attacks
- Includes a comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction
- Provides an Instructor's Manual for academic adopters of the book