In this contributed volume, leading international researchers
explore configuration modeling and checking, vulnerability and risk
assessment, configuration analysis, and diagnostics and discovery.
The authors equip readers to understand automated security
management systems and techniques that increase overall network
assurability and usability. These constantly changing networks
defend against cyber attacks by integrating hundreds of security