Cargando…

Securing the virtual environment : how to defend the enterprise against attack /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ottenheimer, Davi
Otros Autores: Wallace, Matthew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : John Wiley & Sons, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn797855130
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 120503s2012 inua ob 001 0 eng d
010 |a  2012933630 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d ISM  |d SFB  |d DEBSZ  |d COO  |d OCLCQ  |d YDXCP  |d UMI  |d C6I  |d RECBK  |d OCLCF  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCL  |d OCLCQ  |d AZK  |d COCUF  |d MOR  |d PIFAG  |d OCLCQ  |d U3W  |d STF  |d WRM  |d CEF  |d NRAMU  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d OCLCQ  |d UKCRE  |d VLY  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 852491288  |a 865012113  |a 961568047  |a 962678621  |a 974665602  |a 974757733  |a 1018084025  |a 1043655571  |a 1044385420  |a 1053476559  |a 1053527636  |a 1056429674  |a 1058063290  |a 1060197547  |a 1060827174  |a 1065876679  |a 1074332980  |a 1081202567  |a 1083235957  |a 1103277509  |a 1129344178  |a 1152984039  |a 1153497755  |a 1162000487  |a 1192341776 
020 |a 1118155483 
020 |a 9781118155486 
020 |a 111822597X 
020 |a 9781118225974 
020 |a 9781118239261  |q (ebk) 
020 |a 1118239261  |q (ebk) 
020 |a 9781118263952  |q (ebk) 
020 |a 1118263952  |q (ebk) 
020 |z 9781118155486 
020 |z 9781118225974 
020 |a 9786613619686 
020 |a 661361968X 
028 0 1 |a EB00066625  |b Recorded Books 
029 1 |a AU@  |b 000052006319 
029 1 |a AU@  |b 000053027424 
029 1 |a DEBBG  |b BV041431533 
029 1 |a DEBSZ  |b 372739105 
029 1 |a DEBSZ  |b 398273898 
029 1 |a DKDLA  |b 820120-katalog:000599637 
029 1 |a NZ1  |b 14539092 
029 1 |a DKDLA  |b 820120-katalog:999926889805765 
035 |a (OCoLC)797855130  |z (OCoLC)852491288  |z (OCoLC)865012113  |z (OCoLC)961568047  |z (OCoLC)962678621  |z (OCoLC)974665602  |z (OCoLC)974757733  |z (OCoLC)1018084025  |z (OCoLC)1043655571  |z (OCoLC)1044385420  |z (OCoLC)1053476559  |z (OCoLC)1053527636  |z (OCoLC)1056429674  |z (OCoLC)1058063290  |z (OCoLC)1060197547  |z (OCoLC)1060827174  |z (OCoLC)1065876679  |z (OCoLC)1074332980  |z (OCoLC)1081202567  |z (OCoLC)1083235957  |z (OCoLC)1103277509  |z (OCoLC)1129344178  |z (OCoLC)1152984039  |z (OCoLC)1153497755  |z (OCoLC)1162000487  |z (OCoLC)1192341776 
037 |a CL0500000234  |b Safari Books Online 
050 4 |a TK5105.5  |b .O88 2012eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Ottenheimer, Davi. 
245 1 0 |a Securing the virtual environment :  |b how to defend the enterprise against attack /  |c Davi Ottenheimer, Matthew Wallace. 
260 |a Indianapolis, IN :  |b John Wiley & Sons,  |c ©2012. 
300 |a 1 online resource (xxvi, 425 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
504 |a Includes bibliographical references and index. 
505 0 |a Virtualized Environment Attacks -- Attacking from the Outside -- Making the Complex Simple -- Denial of Service -- Abusing the Hypervisor -- Finding Leaks and Obtaining a Side Channel -- Logging and Orchestration -- Forcing an Interception -- Abusing Software as a Service -- Building Compliance into Virtual and Cloud Environments -- Appendix A Building a Virtual Attack Test Lab -- Appendix B About the Media. 
520 8 |a Annotation  |b A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companionDVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestationsAccompanying DVD includes hands-on examples and codeThis how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks. 
650 0 |a Information technology  |x Management. 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
700 1 |a Wallace, Matthew. 
776 0 8 |i Print version:  |a Ottenheimer, Davi.  |t Securing the virtual environment.  |d Indianapolis : John Wiley, ©2012  |z 9781118155486  |w (OCoLC)794639796 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118239261/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4033397 
938 |a ebrary  |b EBRY  |n ebr10560648 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00066625 
938 |a YBP Library Services  |b YANK  |n 12671501 
938 |a YBP Library Services  |b YANK  |n 7613842 
994 |a 92  |b IZTAP