Application of the Survivable Network Analysis Method to Secure My Office System

This paper addresses the results of applying the Survivable Network Analysis method to my office system. A brief overview of the method will be presented followed by a detailed description of the method. The method consists of four basic steps which will be explained. I will show how to implement...
Dale Wutz
December 28, 2001

All papers are copyrighted. No re-posting of papers is permitted