Documentation and guides to deploy and manage.
Describes the application modules and the exchange between them.
Describes the deployment of application modules in their target execution environment and all the services ensuring their proper functioning.
Describes all the measures implemented to prevent unauthorized use, misuse, illegitimate modification, or misappropriation of application modules.