Data Protection and Security |
||||||
VI |
Operating System Security and Secure Programming |
|||||
VI.III |
Security Evaluation |
|||||
Target of the Evaluation: Evaluation criteria refer to either
|
||||||
VI.III.I Q |
[+] Question
[-] Question
Where is the borderline between a security evaluation and the task of security consultancy? |
|||||
|
||||||
|
chapter index | |||||