|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn797855130 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
120503s2012 inua ob 001 0 eng d |
010 |
|
|
|a 2012933630
|
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCO
|d ISM
|d SFB
|d DEBSZ
|d COO
|d OCLCQ
|d YDXCP
|d UMI
|d C6I
|d RECBK
|d OCLCF
|d OCLCQ
|d EBLCP
|d OCLCQ
|d OCL
|d OCLCQ
|d AZK
|d COCUF
|d MOR
|d PIFAG
|d OCLCQ
|d U3W
|d STF
|d WRM
|d CEF
|d NRAMU
|d INT
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d OCLCQ
|d UKCRE
|d VLY
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 852491288
|a 865012113
|a 961568047
|a 962678621
|a 974665602
|a 974757733
|a 1018084025
|a 1043655571
|a 1044385420
|a 1053476559
|a 1053527636
|a 1056429674
|a 1058063290
|a 1060197547
|a 1060827174
|a 1065876679
|a 1074332980
|a 1081202567
|a 1083235957
|a 1103277509
|a 1129344178
|a 1152984039
|a 1153497755
|a 1162000487
|a 1192341776
|
020 |
|
|
|a 1118155483
|
020 |
|
|
|a 9781118155486
|
020 |
|
|
|a 111822597X
|
020 |
|
|
|a 9781118225974
|
020 |
|
|
|a 9781118239261
|q (ebk)
|
020 |
|
|
|a 1118239261
|q (ebk)
|
020 |
|
|
|a 9781118263952
|q (ebk)
|
020 |
|
|
|a 1118263952
|q (ebk)
|
020 |
|
|
|z 9781118155486
|
020 |
|
|
|z 9781118225974
|
020 |
|
|
|a 9786613619686
|
020 |
|
|
|a 661361968X
|
028 |
0 |
1 |
|a EB00066625
|b Recorded Books
|
029 |
1 |
|
|a AU@
|b 000052006319
|
029 |
1 |
|
|a AU@
|b 000053027424
|
029 |
1 |
|
|a DEBBG
|b BV041431533
|
029 |
1 |
|
|a DEBSZ
|b 372739105
|
029 |
1 |
|
|a DEBSZ
|b 398273898
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:000599637
|
029 |
1 |
|
|a NZ1
|b 14539092
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999926889805765
|
035 |
|
|
|a (OCoLC)797855130
|z (OCoLC)852491288
|z (OCoLC)865012113
|z (OCoLC)961568047
|z (OCoLC)962678621
|z (OCoLC)974665602
|z (OCoLC)974757733
|z (OCoLC)1018084025
|z (OCoLC)1043655571
|z (OCoLC)1044385420
|z (OCoLC)1053476559
|z (OCoLC)1053527636
|z (OCoLC)1056429674
|z (OCoLC)1058063290
|z (OCoLC)1060197547
|z (OCoLC)1060827174
|z (OCoLC)1065876679
|z (OCoLC)1074332980
|z (OCoLC)1081202567
|z (OCoLC)1083235957
|z (OCoLC)1103277509
|z (OCoLC)1129344178
|z (OCoLC)1152984039
|z (OCoLC)1153497755
|z (OCoLC)1162000487
|z (OCoLC)1192341776
|
037 |
|
|
|a CL0500000234
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.5
|b .O88 2012eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ottenheimer, Davi.
|
245 |
1 |
0 |
|a Securing the virtual environment :
|b how to defend the enterprise against attack /
|c Davi Ottenheimer, Matthew Wallace.
|
260 |
|
|
|a Indianapolis, IN :
|b John Wiley & Sons,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xxvi, 425 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Virtualized Environment Attacks -- Attacking from the Outside -- Making the Complex Simple -- Denial of Service -- Abusing the Hypervisor -- Finding Leaks and Obtaining a Side Channel -- Logging and Orchestration -- Forcing an Interception -- Abusing Software as a Service -- Building Compliance into Virtual and Cloud Environments -- Appendix A Building a Virtual Attack Test Lab -- Appendix B About the Media.
|
520 |
8 |
|
|a Annotation
|b A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companionDVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestationsAccompanying DVD includes hands-on examples and codeThis how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|
700 |
1 |
|
|a Wallace, Matthew.
|
776 |
0 |
8 |
|i Print version:
|a Ottenheimer, Davi.
|t Securing the virtual environment.
|d Indianapolis : John Wiley, ©2012
|z 9781118155486
|w (OCoLC)794639796
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118239261/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4033397
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10560648
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00066625
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12671501
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7613842
|
994 |
|
|
|a 92
|b IZTAP
|