Many businesses are taking advantage of the speed & efficiency offered by both IM & P2P applications, yet are completely ill-equipped to deal with the management & security ramifications. This book is suitable for system administrators & security professionals who need to bring IM & P2P applications under their control.