This part of the book consists of three appendixes: a list of
places you can go for further information and help with Internet
security; a list of the firewall tools we have referred to and how to
get them; and background information on cryptography.