Return to Article Details System integration and optimization of security in a multilayer virtual network Download Download PDF