The eleventh volume of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Information Technology Protection and
A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in the