Search Content
find
CATALOG
Skip Navigation Links.
Expand Data InfrastructureData Infrastructure
Expand Data ToolsData Tools
Expand Desktops, Laptops and OSDesktops, Laptops and OS
Expand Enterprise ApplicationsEnterprise Applications
Expand IT InfrastructureIT Infrastructure
Expand IT ManagementIT Management
Expand Networking and CommunicationsNetworking and Communications
Expand SecuritySecurity
Expand Servers and Server OSServers and Server OS
Expand Software and Web DevelopmentSoftware and Web Development
Expand StorageStorage
CONNECTIONSmore
Connect with other members or invite your contacts to the community.
GROUPSmore
Join an existing group to participate in the group discussions or create a new group of your own to create discussions around topics of interest to you and your work.
MY RESOURCESmore
Find info or add new info to your ITmodelbook. You can find white papers, technology reports, business analysis, webinars, presentations and more. You can also share your own authored content and resources you like by adding this info.
Resources you may like
  • Share within ITmb

As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts.

  • Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack
  • Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense
  • Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations
  • Accompanying DVD includes hands-on examples and code

This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.

Keywords
Wiley, Wiley:Book Excerpt, Securing the Virtual Environment: How to Defend the Enterprise Against Attack--Free Sample Chapter,
Offered by
Wiley
URL
Files
The resource is available from the link above.
Ask a question
search Paper Image Add papers image
Bookmark to
My ITmodelbook add
Group ITmodelbooks
 
'Sony Creative Software Inc.'
'Create a Memorable Online Experience - Get $40 per Lead'
 

Latest reports from top IT companies:

SAP HP Janrain HubSpot PrepLogic Motorola BNP Media Informatica Microsoft Jobvite