Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation / Edition 1

Hardcover (Print)
Rent from
(Save 69%)
Est. Return Date: 09/08/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $38.15
Usually ships in 1-2 business days
(Save 69%)
Other sellers (Hardcover)
  • All (15) from $38.15   
  • New (6) from $98.69   
  • Used (9) from $37.30   


"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing, March 22, 2007)

"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)

While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation’s infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation’s most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis.

The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.

Read More Show Less

Editorial Reviews

From the Publisher
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing, March 22, 2007)

"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)

Read More Show Less

Product Details

  • ISBN-13: 9780471786283
  • Publisher: Wiley
  • Publication date: 4/21/2006
  • Edition description: BK&CD-ROM
  • Edition number: 1
  • Pages: 486
  • Sales rank: 814,991
  • Product dimensions: 6.42 (w) x 9.25 (h) x 1.24 (d)

Meet the Author

TED G. LEWIS, PHD, is Professor of Computer Science and Academic Associate of the Homeland Defense and Security curriculum at the Naval Postgraduate School. Dr. Lewis is the former senior vice president of Digital Development for Eastman Kodak.
Read More Show Less

Table of Contents


1.1 Recognition

1.2 Natural disaster recovery

1.3 Definitional phase

1.4 Public-private cooperation

1.5 Federalism: Whole of government

1.6 Infrastructure protection within DHS

1.7 Implementing a risk strategy

1.8 Analysis

1.9 Exercises


2.1 Expected utility theory

2.2 PRA and fault trees

2.3 MRBA and resource allocation

2.4 PRA in the supply chain

2.5 Protection versus response

2.6 Threat is an output

2.7 Bayesian belief networks

2.8 A Bayesian network for threat

2.9 Risk of a natural disaster

2.10 Earthquakes

2.11 Black swans and risk

2.12 Black swan floods

2.13 Are natural disasters getting worse?

2.14 Black swan al Qaeda attacks

2.15 Black swan pandemic

2.16 Risk and resilience

2.17 Exercises


3.1 Normal accident theory

3.2 Blocks and springs

3.3 Bak’s punctuated equilibrium theory

3.4 Tragedy of the commons

3.5 The US Electric Power Grid

3.6 Paradox of enrichment

3.7 Competitive exclusion

3.8 Paradox of redundancy

3.8 Resilience of complex infrastructure systems

3.9 Emergence

3.10 Exercises


4.1 CIKR as networks

4.2 Cascading CIKR systems

4.3 Network flow resilience

4.4 Paradox of redundancy

4.5 Network risk

4.6 Exercises


5.1 Early years

5.2 Regulatory structure

5.3 The architecture of the communications sector

5.4 Risk analysis

5.5 Cellular network threats

5.6 Analysis

5.7 Exercises


6.1 Internet as a disruptive technology

6.2 The autonomous system network

6.3 Origins of TCP/IP

6.4 Internet standards

6.5 Toward commercialization

6.6 The World Wide Web

6.7 Internet governance

6.8 Analysis

6.9 Exercises


7.1 Script kiddies and black-hats

7.2 Tools of the trade

7.3 Botnets

7.4 Cyber risk analysis

7.5 Cyber Infrastructure risk

7.6 Analysis

7.7 Exercises

8. Information Technology

8.1 Principles of IT security

8.2 Enterprise systems

8.3 Cyber defense

8.4 Basics of encryption

8.5 Asymmetric encryption

8.6 RSA illustrated

8.7 PKI

8.8 Counter-measures

8.9 Exercises


9.1 A National Priority and a (Familiar) Call to Arms

9.2 Rewriting Cybersecurity Policy: The Difficulty of Reform

9.3 Cybersecurity, Critical Infrastructure, and Public Policy: An Ongoing—and—Difficult Evolution

9.4 Exercises


10.1 What is SCADA?

10.2 SCADA versus enterprise computing differences

10.3 Common threats

10.4 Who is in charge?

10.5 SCADA everywhere

10.6 SCADA risk analysis

10.7 SFPUC SCADA redundancy

10.8 Analysis

10.9 Exercises


11.1 From germs to terrorists

11.2 Foundations: SDWA of 1974

11.3 The Bio-terrorism Act of 2002

11.4 The architecture of water systems

11.5 The Hetch Hetchy network

11.6 Cascade analysis

11.7 Hetch Hetchy investment strategies

11.8 Hetch Hetchy threat analysis

11.9 Analysis

11.10 Exercises


12.1 Energy fundamentals

12.2 Regulatory structure of the energy sector

12.3 Interdependent coal

12.4 The rise of oil and the automobile

12.5 Energy supply chains

12.6 The critical Gulf of Mexico cluster

12.7 Threat analysis of the Gulf of Mexico supply chain

12.8 Network analysis of the Gulf of Mexico supply chain

12.9 The KeystoneXL pipeline controversy

12.10 The natural gas supply chain

12.11 Analysis

12.12 Exercises


13.1 The Grid

13.2 From death rays to vertical integration

13.3 Out of orders 888 and 889 comes chaos

13.4 The North American grid

13.5 Anatomy of a blackout

13.6 Threat analysis

13.7 Risk analysis

13.8 Analysis of WECC

13.9 Analysis

13.10 Exercises


14.1 The sector plan

14.2 Roemer’s model

14.3 The complexity of public health

14.4 Risk analysis of HPH sector

14.5 Bioterrorism

14.6 Epidemiology

14.7 Predicting pandemics

14.8 Bio-surveillance

14.9 Network pandemics

14.10 The world travel network

14.11 Exercises


15.1 Transportation under transformation

15.2 The road to prosperity

15.3 Rail

15.4 Air

15.5 Airport games

15.6 Exercises


16.1 The world is flat, but tilted

16.2 The world trade web

16.3 Risk assessment

16.4 Analysis

16.5 Exercises


17.1 The financial system

17.2 Financial networks

17.3 Virtual currency

17.4 Hacking the financial network

17.5 Hot money

17.6 The end of stimulus?

17.7 Fractal markets

17.8 Exercises


A.1 A priori probability

A.2 A posteriori probability

A.3 Random networks

A.4 Conditional probability

A.5 Bayesian Networks

A.6 Bayesian reasoning

A.7 Further reading


B.1 Expected utility theory

B.2 Bayesian Networks

B.3 Exceedence and PML Risk

B.4 Network Risk

B.5 Model-Based Risk Analysis (MBRA)


C.1 Network as matrix

C.2 Matrix diagonalization

C.3 Relationship to risk and resilience


D.1 Lotka-Volterra model

D.2 Hopf-Holling model


Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)