Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control. Full description