Aimed at helping network designers and security administrators build more robust and secure network topologies, this book focuses on risk assessment methodologies for network architecture design.[...]