Hi everyone, Ed Amoroso here. I want to welcome you to this module. We're going to focus in this module on maybe one of the most foundational issues in cybersecurity, and that's identification, authentication. And you do that 100 times a day on the Internet. Apps and with service you use where you're presenting a user identity, and then proving that you didn't lie. [LAUGH] So, my haze of password or something. Well, you learn lot better ways to do it than just typing a password. And now there's some nice resources that I think you should use as you go through the module, some papers, optional books, and some videos, I'll tell you about them. Couple of papers, I picked two really old ones here. I'm a big proponent of going back and looking at things in our history that help illustrate what we're doing now. These two papers from 1973. One is from Saltzer and Schroeder, it's called the Protection of Information Computer Systems. Old paper, but I think you need to look at it. We don't spend enough time on our history. And forget about cybersecurity, how about just in computer science? We tend not to do enough of that. And the second is from one of the great pioneers, Butler Lampson, wrote a paper, we called, A Node on the Confinement Problem, really, really important paper. And it sort of predicted a lot of the techniques that are used today in virtual infrastructures. So take a look at those two older papers. Now, there's two optional books. One is an optional ebook you can get on Amazon written by myself and my son Matt, it's called from CIA to APT, an Introduction to Cybersecurity, in some sense, a companion ebook to this module and to the course. Again, for those of you who like to have something to read along with them, go ahead and download the book, but it's optional. And then also optional is a really good book on TCP/IP. I think Stephens wrote one of the best ones. There's versions that he's written with co-authors. You just need to get a good book on TCP/IP. And Stephen's book, if you're going to do it, chapters 11 and 12 would be good ones to follow along with as you do through this module. Now, in terms of some videos, there's an awesome TED talk by Chris Thomas. It's called the ones and zeros behind cyber warfare. That was kind of a provocative title, but really good. And then I think there's this paper on the growth of cartography by Ron Rivest. If you've ever heard of RSA, Ron Rivest is the R in RSA, and he's just wonderful, and one of the great gems in cybersecurity. And you should make sure you watch a video from Ron Rivest. So I hope you take advantage of these resources as you go through the module, and I hope you learn quite a bit. Thanks a lot.