Gran parte del materiale su cui si basa questa guida è stato ricavato dai commenti e i suggerimenti degli appartenenti della mailing-list NETTRAIN@UBVM.CC.BUFFALO.EDU (in precedenza NET-TRAIN) e da diverse altre fonti disponibili sul Net:
Un ringraziamento particolare a Wes Morgan, University of Kentucky Engineering Computing Center, per i suoi consigli e raccomandazioni.
Robert Slade, Vancouver Institute for Research into User Security; Pete Hoyle,William & Mary; Timothy A. Torres, San Jose State University; Paul Brians, Washington State University ; Paul F. Lambert, Bentley College; Philip M. Howard, Saint Mary's University; Gordon Swan, Florida Atlantic University; Pauline Kartrude, Florida Atlantic University; Beth Taney, Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry DeVries, Cornell; Jim Milles, SLU Law Library; Martin Raish, State University of New York at Binghamton; Steve Cisler, Apple Corporation; Tom Zillner, Wisconsin Interlibrary Services; Tom Goodrich, Stanford University; Jim Gerland, State University of NY at Buffalo; Ros Leibensperger, Cornell; Paul White, Northern Michigan University; Marilyn S. Webb, Penn State, Judith Hopkins, State University of NY at Buffalo, Ros McCarthy.
Questa traduzione è ospitata da http://urna.iscool.net
2000, ® aabo.tux.nu