Chapter 18 Secure Software Installation and Deployment
Chapter 19 Secure Software Operations and Maintenance