4 Implementing Security Recommendations and Guidelines