Cargando…

Securing the Virtual Environment : How to Defend the Enterprise Against Attack (with DVD).

A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important.€Useful for service providers as well as enterprise and small business IT professionals the book...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ottenheimer, Davi
Otros Autores: Wallace, Matthew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn792684082
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 120430s2012 xx ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d N$T  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d COO  |d TEFOD  |d S3O  |d OCLCQ  |d ZCU  |d MERUC  |d OCLCQ  |d ICG  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781118225974  |q (electronic bk.) 
020 |a 111822597X  |q (electronic bk.) 
020 |a 9781118239261  |q (electronic bk.) 
020 |a 1118239261  |q (electronic bk.) 
020 |z 9781118155486 
020 |z 1118155483 
029 1 |a DEBBG  |b BV044160129 
029 1 |a DEBSZ  |b 39718686X 
029 1 |a AU@  |b 000067094826 
035 |a (OCoLC)792684082 
037 |a 3C6E078E-FF08-4184-BF35-0A2E0F634D86  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HF5548.2 
072 7 |a COM  |x 057000  |2 bisacsh 
082 0 4 |a 006.8 
049 |a UAMI 
100 1 |a Ottenheimer, Davi. 
245 1 0 |a Securing the Virtual Environment :  |b How to Defend the Enterprise Against Attack (with DVD). 
260 |a Hoboken :  |b John Wiley & Sons,  |c 2012. 
300 |a 1 online resource (458 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Securing the Virtual Environment; Contents; Introduction; Chapter 1 Virtualized Environment Attacks; A Brief Introduction to the Cloud; Flavors of "Cloud"; Powering the Cloud; Why the Cloud Is Here to Stay; Managing Cloud Security; Principles of Information Security; Information Assets; Potential Threats; Potential Vulnerabilities; Potential Consequences; Incremental Risk Mitigation; Deny by Default; Never Trust Input; Assume the Worst; Confidentiality, Integrity, and Availability; The Human Factor; Managing Cloud Risks; Asset Management; Vulnerability Assessment; Communication. 
505 8 |a Authentication and AuthorizationSoftware; Managing Cloud Compliance; Defining Compliance and Security; Making Use of Warnings; Cloud and the PKI; Summary; Chapter 2 Attacking from the Outside; Who Is an Outsider?; HR Policies and Procedures; Contracting and Outsourcing Talent; Friends and Family Discount; Configuring Cloud Audit Logs; Keeping Tabs on Accounts; Extending and Trusting Communication; Delegating and Spreading Roles in Order to Scale; Novice Users Empowered by Cloud Environments; Outsourced and Offshored Resources; SaaS Software Development at "Cloud Speed." 
505 8 |a The Needs of Bespoke SolutionsEnsuring Continuity; Underspecialization; How to Piggyback on Fixes; Sudo and Shell Logging; Spoofing a Certificate; Summary; Chapter 3 Making the Complex Simple; Looking Around Without Getting Caught; Checking to See If Anyone Is Watching; Checking for Gaps in Awareness; Checking for Responsiveness; Complexity and the Cloud; Choosing a Spot with a View; The Hypervisor; The Director/Orchestrator/Manager; Assessing the Risk from Assessors; Slicing and Dicing Data; Detecting Layers of Virtualization Technology; Identifying and Targeting Assets; Versions. 
505 8 |a Supporting InfrastructureMail Servers; Web Servers; Domain Name Service; Databases and Directory Services; Timing an Attack; Long-versus Short-Term Objectives; How Long before You Are Ready to Attack?; How Long before You Can Attack Again?; Summary; Chapter 4 Denial of Service; Finding Signal in Noise; Improving Denial; Distributing Denial; Defining Success; Finding Service Vulnerabilities; Scanning and Validating Service Levels; Abstracting and Overcommitting; Validating Complexity; Limits of Penetration Testing; Denial of Testing; Testing for Denial. 
505 8 |a Abusing Proximity of Services: Step Attacks and Speed AttacksExploiting Service Vulnerabilities; Breaking Connections Between Services; Exhausting Resources; CPU; Memory; Disk Space and IOPS; The Dangers of Overcommitment; Locking Out Others; Summary; Chapter 5 Abusing the Hypervisor; Replacing Hardware Layers with Software; Relating Physical to Virtual; Displays; Memory; Disk; Network; Compromising the Kernel; Low-Level Interception; Real-World Example: Duqu; Classification and Defense; Breaking Out of KVM; Attacking Virtual CPU and Memory; The Cup Is Half Secure; Taking Plato's Shadow Pill. 
500 |a Demonstrating the Risks. 
520 |a A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important.€Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion€DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks. 
650 0 |a Information technology  |x Management. 
650 0 |a Information technology. 
650 0 |a Computer science. 
650 0 |a Business. 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Technologie de l'information  |x Gestion. 
650 6 |a Technologie de l'information. 
650 6 |a Informatique. 
650 6 |a Affaires. 
650 7 |a information technology.  |2 aat 
650 7 |a business (commercial function)  |2 aat 
650 7 |a COMPUTERS  |x Virtual Worlds.  |2 bisacsh 
650 7 |a Business  |2 fast 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer science  |2 fast 
650 7 |a Information technology  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
700 1 |a Wallace, Matthew. 
758 |i has work:  |a Securing the virtual environment (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGv9gGpxD9f9DDjGXM47BP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ottenheimer, Davi.  |t Securing the Virtual Environment : How to Defend the Enterprise Against Attack (with DVD).  |d Hoboken : John Wiley & Sons, ©2012  |z 9781118155486 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=821838  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 7613842 
994 |a 92  |b IZTAP