Donny Koh

8%
Flag icon
It requires a detailed inventory of every component and configuration. It also requires the collection and maintenance of complete documentation for every system component, from hardware to software and from configuration settings to security features.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating