| http://www.w3.org/ns/prov#value | - So whilst i use checklists; in terms of having written extensive tools over the years i do not work through a checklist as such as each system has different requirements and security issues, each check can have a different risk level based on what else is going on.
|