Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection
This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.
The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure--the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.
A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows(r) and Apple Macintosh(r) compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.
This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.
Excellent book, but not for the feint of heart
By T. J. Lindberg - April 24, 2008
I am in the military and have an engineering background. I have also been conducting research that is closely related to the topic of this book for the past few years and this is a sacred text to me! If you are looking for a laundry list/ cookie cutter approach to a very complex problem, you probably don't want to buy this book. However, even though it is rather technical (the author has a background in computer science and mathematics, so as long as you do your homework on the author, this shouldn't surprise anyone), one can skip the technical discussion on optimization techniques, reliability theory, and network (critical node) analysis and still follow the plainly written examples without a loss of continuity. I just wish our policy-makers adhered to the guidance contained within the pages of Dr. Lewis' book on a more consistent basis... Bottom line: Find the "critical nodes" in an infrastructure sector (which Lewis helps you do) and apply resources (time, people, $$$)... read more
CIP in Homeland Security
By M. Pickette "Mykime" - November 5, 2006
I wish there was a score lower than 1 star to give.
First of all, let me say that there is valuable information in this book, if you are willing to sift the chaff for wheat.
However comma this book (as is admitted in the forward) was only written so the author could keep his job. And it shows.
The author contradicts himself, is overly complex when explaining things (why explain it to the reader when you can use overly difficult math instead?), and doesn't even provide answers to the questions posed in the end of chapter sections. When I say doesn't provide them, he wouldn't even give them to his publisher, I checked.
So, if you have the time to sift and decipher, this is the book for you, If not then I would recommend that you keep searching elsewhere for CIP information, my friend.
An okay book on CIP, but lacks many things
By Britton J. Holdaway - April 21, 2010
I used this book for a graduate course through the University of Washington. I purchased it new and used the CD in the back for my class. The course's reading schedule did not comprise the whole book (excluded some two or three chapters), but covered enough of it that I feel justified in posting my opinions about it here.
First, the book is in strong need of an editorial review. Grammatical errors and contradictory statements run throughout the book. It seems as though the material was put together rather quickly and little to no effort was spent giving it a professional appearance or delivery.
Second, the author fails to provide sources for many of the things he includes in the book. (To give him credit, all quotes and direct references were given citations.) I can handle a lack of sources to an extent, but have a difficult time accepting that a Computer Scientist has the requisite knowledge of, say economics, to pontificate and exrapolate his books... read more
Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology ...