Cargando…

VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environment /

This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Greer, Mike (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn899243113
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150106s2014 enka ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d DEBBG  |d YDXCP  |d DEBSZ  |d OCLCA  |d REB  |d CEF  |d UAB  |d AU@  |d VT2  |d RDF  |d OCLCO  |d OCLCQ  |d QGK 
019 |a 907300014  |a 1259217146 
020 |a 9781782170358 
020 |a 1782170359 
020 |a 1782170340 
020 |a 9781782170341 
020 |z 9781782170341 
029 1 |a DEBBG  |b BV042490484 
029 1 |a DEBSZ  |b 43483663X 
035 |a (OCoLC)899243113  |z (OCoLC)907300014  |z (OCoLC)1259217146 
037 |a CL0500000519  |b Safari Books Online 
050 4 |a QA76.9.V5 
082 0 4 |a 005.43  |2 23 
049 |a UAMI 
100 1 |a Greer, Mike,  |e author. 
245 1 0 |a VMware vSphere Security Cookbook :  |b Over 75 practical recipes to help you successfully secure your vSphere environment /  |c Mike Greer. 
246 3 0 |a Over 75 practical recipes to help you successfully secure your vSphere environment 
246 3 |a Over seventy-five practical recipes to help you successfully secure your vSphere environment 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from cover page (Safari, viewed January 6, 2015). 
500 |a "Quick answers to common problems"--Cover 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client 
505 8 |a Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions 
505 8 |a Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter 
505 8 |a Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes 
505 8 |a Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5 
520 |a This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Virtual computer systems. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Systèmes virtuels (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Virtual computer systems.  |2 fast  |0 (OCoLC)fst01167683 
776 |z 1-78217-034-0 
776 |z 1-322-33590-7 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781782170341/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 12181078 
994 |a 92  |b IZTAP