The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection andsimulation technologies. The objective is to develop a simulatorthat can model cloud computing systems and generate pseudo randomcyber-security attacks. The book also explores theinformation technology concerns, challenges and opportunities in acloud-centric framework, and develops a strategy for a real-worlddeployment. The book takes...