. . . "The guidelines in this chapter support the use of protected types to encapsulate and synchronize access to shared data." .