When in operation, the non functional behavior of a solution is effected by characteristics of several areas in an enterprise that are both functional and non functional. My attempt is to look at security behavior of a solution in a holistic sense in the midst of cluttered and influencing landscape and discuss the areas/factors that influence this very behavior.
No comments:
Post a Comment