menu
{ "item_title" : "Network Topology in Command and Control", "item_author" : [" T. J. Grant", "R. H. P. Janssen", "H. Monsuur "], "item_description" : "Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modeling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/46/666/058/1466660589_b.jpg", "price_data" : { "retail_price" : "215.00", "online_price" : "215.00", "our_price" : "215.00", "club_price" : "215.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Network Topology in Command and Control|T. J. Grant

Network Topology in Command and Control : Organization, Operation, and Evolution

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modeling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

This item is Non-Returnable

Details

  • ISBN-13: 9781466660588
  • ISBN-10: 1466660589
  • Publisher: Information Science Reference
  • Publish Date: May 2014
  • Dimensions: 11 x 8.5 x 0.81 inches
  • Shipping Weight: 2.43 pounds
  • Page Count: 352

Related Categories

You May Also Like...

    1

BAM Customer Reviews