In previous chapters we discussed how secrecy can be quantified: we described information measures that map a prior to a real number reflecting the amount of threat to which the secret is subjected; and we introduced g-vulnerabilities as a rich family of such information measures that can capture a variety of significant operational scenarios.