|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBSCO_ocn855895396 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130816s2013 xx o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d E7B
|d MHW
|d MEAUC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d S4S
|d N$T
|d RIV
|d OCLCQ
|d COO
|d OCLCQ
|d FEM
|d AGLDB
|d MERUC
|d OCLCQ
|d U3W
|d VTS
|d OCLCQ
|d UKMGB
|d STF
|d M8D
|d UKAHL
|d VT2
|d OCLCQ
|d UKCRE
|d AJS
|d OCLCO
|d OCLCQ
|d QGK
|d S2H
|
015 |
|
|
|a GBB747142
|2 bnb
|
016 |
7 |
|
|a 018005495
|2 Uk
|
019 |
|
|
|a 968113824
|a 969085332
|a 1103252669
|a 1129347115
|a 1153559787
|a 1259180059
|a 1289516281
|
020 |
|
|
|a 1299783686
|q (electronic bk.)
|
020 |
|
|
|a 9781299783683
|q (electronic bk.)
|
020 |
|
|
|a 9781782170099
|q (electronic bk.)
|
020 |
|
|
|a 178217009X
|q (electronic bk.)
|
020 |
|
|
|a 9781782170082
|
020 |
|
|
|a 1782170081
|
029 |
1 |
|
|a AU@
|b 000062476147
|
029 |
1 |
|
|a CHNEW
|b 000638620
|
029 |
1 |
|
|a CHNEW
|b 001052021
|
029 |
1 |
|
|a CHVBK
|b 567708411
|
029 |
1 |
|
|a DEBBG
|b BV043776987
|
029 |
1 |
|
|a DEBSZ
|b 397614519
|
029 |
1 |
|
|a DEBSZ
|b 472796038
|
029 |
1 |
|
|a UKMGB
|b 018005495
|
035 |
|
|
|a (OCoLC)855895396
|z (OCoLC)968113824
|z (OCoLC)969085332
|z (OCoLC)1103252669
|z (OCoLC)1129347115
|z (OCoLC)1153559787
|z (OCoLC)1259180059
|z (OCoLC)1289516281
|
037 |
|
|
|a 509619
|b MIL
|
050 |
|
4 |
|a QA76.9.D348 .L348 2013
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.36
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Langenhan, Daniel.
|
245 |
1 |
0 |
|a VMware View Security Essentials.
|
260 |
|
|
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
520 |
|
|
|a A practical and fast-paced guide that gives you all the information you need to secure your virtual environment. This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to View; VMware View definitions; Summary; Chapter 2: Securing Your Base; vSphere considerations; VMware High Availability (HA); Fault Tolerance (FT); DRS and resource pools; Capacity planning; Basic View hardening; vSphere hardening; Operation system (OS) hardening; User accounts; A View Administrator Console user; Services; Logging; The Event Database; Logfiles; VMware support logs; SSL certificates.
|
505 |
8 |
|
|a Create a Certificate Authority (CA) and obtaining a certificateCreate a CA on AD; Create a certificate; Importing a certificate; Retrofit vSphere; The View Composer; The View Connection Server; Create a redundant View Connection Server; Usage of a replica server; Installation of a replica server; Creating a load balanced View Connection Server; A configuration example with vCloud Network and Security (vCNS or vShield); Summary; Chapter 3: Securing the Connection; View connections; A View DMZ; View Security Server; Setup; Load balancing; General connection settings; Desktop connection.
|
505 |
8 |
|
|a A quick look at TCP and UDPRemote Desktop Protocol (RDP); PCoverIP (PCoIP); RDP and PCoIP -- direct comparison; Setting up PCoIP Secure Gateway; HTTP(s) secure tunnel; USB redirection; Multimedia redirect (MMR); View Transfer Server; Setup; Server connection; View connect and security firewall rules; Summary; Chapter 4: Securing the Client; Client software; View Client; View Agent; Local Mode; Global settings; View desktop pools; The Settings tab; The Inventory tab; The Sessions tab; The Entitlements tab; The Events tab; The Policies tab; Working with ADM templates.
|
505 |
8 |
|
|a Importing View ADM templatesView Agent settings; View Client settings; Working with USB devices; View Persona management; Example setup; Summary; Chapter 5: Backup and Recovery; Backup and recovery; The vSphere environment; VMware View Servers; Basic infrastructure; Desktop pools and linked cloning; Documenting -- the ultimate backup; Backup timing; Patching the View environment; View server; View desktops; Summary; Index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a AVMware.
|
650 |
|
0 |
|a Virtual computer systems
|x Security measures.
|
650 |
|
6 |
|a Systèmes virtuels (Informatique)
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
655 |
|
4 |
|a Llibres electrònics.
|
776 |
0 |
8 |
|i Print version:
|z 9781299783683
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=619995
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26849661
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1336405
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10742633
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 619995
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26009430
|
994 |
|
|
|a 92
|b IZTAP
|