Lecture10 - Deployment, Security.pdf