|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn792684082 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
120430s2012 xx ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d YDXCP
|d N$T
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d COO
|d TEFOD
|d S3O
|d OCLCQ
|d ZCU
|d MERUC
|d OCLCQ
|d ICG
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781118225974
|q (electronic bk.)
|
020 |
|
|
|a 111822597X
|q (electronic bk.)
|
020 |
|
|
|a 9781118239261
|q (electronic bk.)
|
020 |
|
|
|a 1118239261
|q (electronic bk.)
|
020 |
|
|
|z 9781118155486
|
020 |
|
|
|z 1118155483
|
029 |
1 |
|
|a DEBBG
|b BV044160129
|
029 |
1 |
|
|a DEBSZ
|b 39718686X
|
029 |
1 |
|
|a AU@
|b 000067094826
|
035 |
|
|
|a (OCoLC)792684082
|
037 |
|
|
|a 3C6E078E-FF08-4184-BF35-0A2E0F634D86
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HF5548.2
|
072 |
|
7 |
|a COM
|x 057000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ottenheimer, Davi.
|
245 |
1 |
0 |
|a Securing the Virtual Environment :
|b How to Defend the Enterprise Against Attack (with DVD).
|
260 |
|
|
|a Hoboken :
|b John Wiley & Sons,
|c 2012.
|
300 |
|
|
|a 1 online resource (458 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Securing the Virtual Environment; Contents; Introduction; Chapter 1 Virtualized Environment Attacks; A Brief Introduction to the Cloud; Flavors of "Cloud"; Powering the Cloud; Why the Cloud Is Here to Stay; Managing Cloud Security; Principles of Information Security; Information Assets; Potential Threats; Potential Vulnerabilities; Potential Consequences; Incremental Risk Mitigation; Deny by Default; Never Trust Input; Assume the Worst; Confidentiality, Integrity, and Availability; The Human Factor; Managing Cloud Risks; Asset Management; Vulnerability Assessment; Communication.
|
505 |
8 |
|
|a Authentication and AuthorizationSoftware; Managing Cloud Compliance; Defining Compliance and Security; Making Use of Warnings; Cloud and the PKI; Summary; Chapter 2 Attacking from the Outside; Who Is an Outsider?; HR Policies and Procedures; Contracting and Outsourcing Talent; Friends and Family Discount; Configuring Cloud Audit Logs; Keeping Tabs on Accounts; Extending and Trusting Communication; Delegating and Spreading Roles in Order to Scale; Novice Users Empowered by Cloud Environments; Outsourced and Offshored Resources; SaaS Software Development at "Cloud Speed."
|
505 |
8 |
|
|a The Needs of Bespoke SolutionsEnsuring Continuity; Underspecialization; How to Piggyback on Fixes; Sudo and Shell Logging; Spoofing a Certificate; Summary; Chapter 3 Making the Complex Simple; Looking Around Without Getting Caught; Checking to See If Anyone Is Watching; Checking for Gaps in Awareness; Checking for Responsiveness; Complexity and the Cloud; Choosing a Spot with a View; The Hypervisor; The Director/Orchestrator/Manager; Assessing the Risk from Assessors; Slicing and Dicing Data; Detecting Layers of Virtualization Technology; Identifying and Targeting Assets; Versions.
|
505 |
8 |
|
|a Supporting InfrastructureMail Servers; Web Servers; Domain Name Service; Databases and Directory Services; Timing an Attack; Long-versus Short-Term Objectives; How Long before You Are Ready to Attack?; How Long before You Can Attack Again?; Summary; Chapter 4 Denial of Service; Finding Signal in Noise; Improving Denial; Distributing Denial; Defining Success; Finding Service Vulnerabilities; Scanning and Validating Service Levels; Abstracting and Overcommitting; Validating Complexity; Limits of Penetration Testing; Denial of Testing; Testing for Denial.
|
505 |
8 |
|
|a Abusing Proximity of Services: Step Attacks and Speed AttacksExploiting Service Vulnerabilities; Breaking Connections Between Services; Exhausting Resources; CPU; Memory; Disk Space and IOPS; The Dangers of Overcommitment; Locking Out Others; Summary; Chapter 5 Abusing the Hypervisor; Replacing Hardware Layers with Software; Relating Physical to Virtual; Displays; Memory; Disk; Network; Compromising the Kernel; Low-Level Interception; Real-World Example: Duqu; Classification and Defense; Breaking Out of KVM; Attacking Virtual CPU and Memory; The Cup Is Half Secure; Taking Plato's Shadow Pill.
|
500 |
|
|
|a Demonstrating the Risks.
|
520 |
|
|
|a A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important.€Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion€DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Business.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
6 |
|a Technologie de l'information.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
6 |
|a Affaires.
|
650 |
|
7 |
|a information technology.
|2 aat
|
650 |
|
7 |
|a business (commercial function)
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Virtual Worlds.
|2 bisacsh
|
650 |
|
7 |
|a Business
|2 fast
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer science
|2 fast
|
650 |
|
7 |
|a Information technology
|2 fast
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
700 |
1 |
|
|a Wallace, Matthew.
|
758 |
|
|
|i has work:
|a Securing the virtual environment (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGv9gGpxD9f9DDjGXM47BP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Ottenheimer, Davi.
|t Securing the Virtual Environment : How to Defend the Enterprise Against Attack (with DVD).
|d Hoboken : John Wiley & Sons, ©2012
|z 9781118155486
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=821838
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7613842
|
994 |
|
|
|a 92
|b IZTAP
|