Written for academics and researchers in companies developing network security products, this reference presents a methodology for understanding the behavior of complicated computing environments such as the Internet. It describes how to analyze the behavior of computing environments with regard to security events and provides a tool kit of advanced techniques to assist in solving problems, from optimizing the security elements in large-scale network design to conducting complicated forensic investigations. The book also provides a series of sample cases which demonstrate the application of combinatorial analytics to a real world problems in Information Assurance.