Offers comprehensive coverage of both survivability & security techniques, & the manner in which these two components interact to build robust Information Assurance. This book addresses this issue by detailing the sufficient capacity networked systems that need to operate while under attack.