This book is intended to describe with analytical rigor the concept of distributed networked operations, which is a refinement of what have popularly been called “network centric operations.” Distributed networked operations envision combat being conducted by large numbers of diverse and small units—rather than by small numbers of generally homogenous, large units. Examples of the latter are sea battles between blue water fleets and strategic bombing campaigns.
In theory and to a significant extent in practice in Afghanistan and Iraq, distributed networked operations involve a mixed bag of naval, ground and air units, none of which is individually as powerful as a fleet, air wing or armored division. Operations of this sort do have advantages that more traditional approaches lack. For example, properly executed distributed networked operations are less dependent on the survival of individual units and thus should be harder for an adversary to disrupt.
The key is how the activities of geographically dispersed and functionally diverse units are orchestrated, or controlled. This is obviously a complex matter that requires a thorough understanding of the concepts upon which distributed networked operations are based.
Click here to buy from Amazon
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.
*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios
*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.
*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Click here to buy from Amazon