Artech House, 2007. — 294 p.
This book explores recent developments in computational solutions to problems of exploiting or mitigating vulnerabilities within organizational decision-making processes. It describes a range of computational techniques that can help to guide attacks on an adversary’s organization or the defense of one’s own.
From an engineering perspective, the applications of the techniques described in this book cover a broad range of practical problems. They include planning and command of military operations against an enemy command organization, military and foreign intelligence, antiterrorism and domestic security, information security, organizational design, military psychology and training, management practice, and organizational computing. In particular, one discipline — information warfare — traditionally paid special attention to issues related to attacking and defending military command organizations.