I want to work on making a protocol for assessment of those platforms for security strength, weaknesses, etc.

Similar questions and discussions