Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
260 Vulnerability ManageMent
In some states, the punitive damages for customer data com-•
promise can be significant. If this is relevant to your business,
highlight it.
8.4 Requirements Document
Anyone who has worked on a formal IT project knows the neces-
sity of a requirements document. is document will align the goals,
processes, and systems in the organization with the functional capa-
bilities of the target solution. ese requirements may extend beyond
system specification and include the related processes that must be
developed or changed. Following is a list of some of the key compo-
nents of the requirements document:
Functional requirements: Explain in detail what all software •
and hardware components should do. ese requirements
may ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512