Introduces the theoretical foundations & solution techniques for securing critical cyber & physical infrastructures & their underlying computing & communication architectures & systems. This book addresses the technical challenges facing design of secure infrastructures by providing examples of internal & external attack scenarios.