Description:This text explains and covers aspects of how to protect the company's data and information systems while integrating complex network environments involving multiple network operating systems and providing remote access to mobile workers and telecommuters.