Security Case and Design Good Practice 0.0 / 5 ? ComputingDesign good practiceUniversityOther Created by: Kath_SiobhanCreated on: 16-10-18 15:38 2341 Across 1. Control Set of TL0 (4) 3. Control Set of TL3 (2, 9) 4. Control Set of TL2 (8, 2, 8) Down 2. Control Set of TL1 (2, 10)
Comments
No comments have yet been made