By this time, you have begun to find ways to link pieces of what we have accomplished into a semblance of order. This chapter is devoted to making use of the connections you have made and the credibility you have built. Now, after you have applied the research we embarked on in the first chapters, you have synthesized a full set of documentation with regard to information security. As a matter of form, do not lose track of the other contributors: the ones whose work you included, paraphrased, or built from. Also, remember the help you got in review and direction: the builders of what formal documentation currently existed and the actual documentation team, who helped you make certain that what you were toiling over met company standards and form.