A fundamental, comprehensive framework for network security which may be used by the military, government, industry, and academia network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. This book is intended for researchers and graduate students in computer science and engineering, specializing in network security, practitioners in network security, and architects and policy makers for large-scale network infrastructure.