Virtualization Security : Protecting Virtualized Environments /
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the tech...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Wiley,
2013.
|
Colección: | Serious skills.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn823728296 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 121129s2013 inu o 001 0 eng d | ||
010 | |a 2012540979 | ||
040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d OCLCO |d YDXCP |d UMI |d B24X7 |d IDEBK |d CDX |d COO |d DEBSZ |d OCLCQ |d EBLCP |d N$T |d OCLCQ |d OCLCF |d NKT |d OCLCQ |d AZK |d CNNOR |d MOR |d PIFAG |d LIV |d OCLCQ |d MERUC |d OCLCQ |d SAV |d OCLCQ |d ZCU |d U3W |d STF |d WRM |d CEF |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d VLY |d BRF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB288211 |2 bnb | ||
016 | 7 | |a 016162665 |2 Uk | |
019 | |a 818858058 |a 818870627 |a 841325762 |a 961624158 |a 962694317 |a 1055405829 |a 1065704026 |a 1081275340 |a 1103267657 |a 1129360264 |a 1153006234 |a 1162217380 |a 1192340289 | ||
020 | |a 9781118333754 |q (e-book) | ||
020 | |a 1118333756 |q (e-book) | ||
020 | |a 9781118331514 | ||
020 | |a 1118331516 | ||
020 | |a 9781118334874 |q (ebk.) | ||
020 | |a 1118334876 |q (ebk.) | ||
020 | |z 9781118288122 | ||
020 | |z 1118288122 |q (pbk.) | ||
020 | |a 1283835118 | ||
020 | |a 9781283835114 | ||
029 | 1 | |a AU@ |b 000050633250 | |
029 | 1 | |a AU@ |b 000051433056 | |
029 | 1 | |a CHNEW |b 000612638 | |
029 | 1 | |a DEBBG |b BV041121677 | |
029 | 1 | |a DEBBG |b BV041907902 | |
029 | 1 | |a DEBBG |b BV044166571 | |
029 | 1 | |a DEBSZ |b 39676598X | |
029 | 1 | |a DEBSZ |b 397330936 | |
029 | 1 | |a NZ1 |b 14833215 | |
029 | 1 | |a NZ1 |b 15121395 | |
035 | |a (OCoLC)823728296 |z (OCoLC)818858058 |z (OCoLC)818870627 |z (OCoLC)841325762 |z (OCoLC)961624158 |z (OCoLC)962694317 |z (OCoLC)1055405829 |z (OCoLC)1065704026 |z (OCoLC)1081275340 |z (OCoLC)1103267657 |z (OCoLC)1129360264 |z (OCoLC)1153006234 |z (OCoLC)1162217380 |z (OCoLC)1192340289 | ||
037 | |a CL0500000213 |b Safari Books Online | ||
050 | 4 | |a QA76.9.V5 |b S53 2013eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Shackleford, Dave. | |
245 | 1 | 0 | |a Virtualization Security : |b Protecting Virtualized Environments / |c Dave Shackleford. |
260 | |a Indianapolis, Ind. : |b Wiley, |c 2013. | ||
300 | |a 1 online resource (xxii, 334 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Sybex serious skills | |
505 | 0 | |a Fundamentals of virtualization security -- Securing hypervisors -- Designing virtual networks for security -- Advanced virtual network operations -- Virtualization management and client security -- Securing the virtual machine -- Logging and auditing -- Change and configuration management -- Disaster recovery and business continuity -- Scripting tips and tricks for automation -- Additional security considerations for virtual infrastructure. | |
520 | |a Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Micro. | ||
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Virtual computer systems. | |
650 | 0 | |a Application software. | |
650 | 6 | |a Systèmes virtuels (Informatique) | |
650 | 6 | |a Logiciels d'application. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Application software |2 fast | |
650 | 7 | |a Virtual computer systems |2 fast | |
758 | |i has work: |a Virtualization Security (Work) |1 https://id.oclc.org/worldcat/entity/E39PD3gP6Yb3QQ3KVPMfqyqTgX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shackleford, Dave. |t Virtualization security. |d Indianapolis, Ind. : Wiley, 2013 |w (DLC) 2012917323 |
830 | 0 | |a Serious skills. | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118331514/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=947870 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH25045648 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH24465102 | ||
938 | |a Books 24x7 |b B247 |n bks00051288 | ||
938 | |a Coutts Information Services |b COUT |n 24299621 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL947870 | ||
938 | |a ebrary |b EBRY |n ebr10626252 | ||
938 | |a EBSCOhost |b EBSC |n 500245 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24299621 | ||
938 | |a YBP Library Services |b YANK |n 9910198 | ||
938 | |a YBP Library Services |b YANK |n 12672112 | ||
994 | |a 92 |b IZTAP |