Design and Implementation of Survivable Network Systems

Author(s):  
Chao Wang ◽  
Jianfeng Ma ◽  
Jianming Zhu
2003 ◽  
Vol 48 (4) ◽  
pp. 963-972 ◽  
Author(s):  
Dong-Sung Kim ◽  
Jae-Min Lee ◽  
Wook Hyun Kwon ◽  
In Kwan Yuh

1997 ◽  
Author(s):  
R. J. Ellison ◽  
D. A. Fisher ◽  
R. C. Linger ◽  
H. F. Lipson ◽  
T. Longstaff

Author(s):  
Biwu Yang

Firewall is a critical technology in protecting enterprise network systems and individual hosts. Firewalls can be implemented through a specific software application or as a dedicated appliance. Depending on the security policies in an organization, several firewall implementation architectures are available, each with its advantages and disadvantages. Therefore, a thorough understanding of firewall technology, its features and limitations, and implementation considerations is very important in the design and implementation of effective firewall architecture in an organization. This chapter covers the life cycle of firewall design, selection, and implementation.


2015 ◽  
Vol 24 (3) ◽  
pp. 106-113 ◽  
Author(s):  
Stephen N. Calculator

Purpose To provide an overview of communication characteristics exhibited by individuals with Angelman Syndrome (AS) and special considerations associated with the design and implementation of augmentative and alternative communication (AAC) programs. Method Results of recent studies exploring individuals' uses of AAC are reviewed, with particular emphasis on factors related to individuals' acceptance and successful uses of AAC systems. Results Not applicable Conclusion Despite their inconsistent access to practices previously found to foster individuals' acceptance of AAC systems, individuals with AS demonstrate the ability to use AAC systems, including high-tech AAC devices, successfully.


Sign in / Sign up

Export Citation Format

Share Document