L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBNLes informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
The essential guide to protecting your virtualized systems
Securing virtual environments is not the same as securing physical environments the stakes are higher and the process is more complicated. With different architectural models, new attack vectors, and new security controls to implement and tune, virtualization dramatically changes the security playing field.
Discover the best practices for securing your virtualized systems with this detailed guide. Author Dave Shackleford is a well–known security expert who brings you up to speed on the technologies and strategies you should know and shows you how to properly secure virtual environments.
This essential guide includes:
A thorough overview of virtualization security actual and theoretical threats
Step–by–step processes for securing the three leading hypervisors VMware vSphere and ESXi, Microsoft Hyper–V®, and Citrix XenServer®
Smart ways to design virtual networks to be more secure from the outset
Effective strategies for integrating new virtual network layers into existing physical infrastructures
Securing virtual machines (VMs), especially against VM–focused attacks
Proper logging and auditing management for virtual environments
Managing change and configuration with new policies and processes that take into consideration virtualization security
Tips and tricks for improving disaster recovery and business continuity
Leveraging Virtual Desktop Infrastructure (VDI) for security, as well as considerations for securing Storage Virtualization and Application Virtualization
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What′s more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step–by–step configurations for the security controls that come with the three leading hypervisor––VMware vSphere and ESXi, Microsoft Hyper–V on Windows Server 2008, and Citrix XenServer.
This must–have resource offers tips and tricks for improving disaster recovery and business continuity, security–specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Frais de port :
EUR 3,69
Vers Etats-Unis
Description du livre Paperback. Etat : new. New. Fast Shipping and good customer service. N° de réf. du vendeur Holz_New_1118288122
Description du livre Paperback. Etat : new. New. N° de réf. du vendeur Wizard1118288122
Description du livre Etat : New. N° de réf. du vendeur 14358099-n
Description du livre Paperback. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur think1118288122
Description du livre Etat : new. N° de réf. du vendeur FrontCover1118288122
Description du livre paperback. Etat : New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). N° de réf. du vendeur 001360051N
Description du livre Softcover. Etat : New. 1. Securing virtual environments for VMware, Citrix, and Microsoft hypervisorsVirtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer. Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effectiveThis must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security. N° de réf. du vendeur DADAX1118288122
Description du livre Paperback. Etat : new. Brand New Copy. N° de réf. du vendeur BBB_new1118288122
Description du livre Etat : New. N° de réf. du vendeur 14358099-n