Appendicies
Appendix A. Types of Computer Threats
Appendix B. Fighting Computer Threats
Appendix C. Contacting Support