The publication contains information of about information security tools and how can we leverage them to the fullest.