Summary
Approaches for verification and validation will be documented the results of security testing as well as the identified vulnerabilities and their counter measures will be described
More information & hyperlinks