Virtualization Security

Protecting Virtualized Environments

Nonfiction, Computers, Operating Systems
Cover of the book Virtualization Security by Dave Shackleford, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dave Shackleford ISBN: 9781118331514
Publisher: Wiley Publication: November 8, 2012
Imprint: Sybex Language: English
Author: Dave Shackleford
ISBN: 9781118331514
Publisher: Wiley
Publication: November 8, 2012
Imprint: Sybex
Language: English

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

  • Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
  • Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
  • Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
  • Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

More books from Wiley

Cover of the book Autophagy, Infection, and the Immune Response by Dave Shackleford
Cover of the book Wiley Interpretation and Application of IFRS Standards by Dave Shackleford
Cover of the book Personnel Psychology and Human Resources Management by Dave Shackleford
Cover of the book The Athena Doctrine by Dave Shackleford
Cover of the book Interpretation of Equine Laboratory Diagnostics by Dave Shackleford
Cover of the book IV Therapy For Dummies by Dave Shackleford
Cover of the book The Customer-Funded Business by Dave Shackleford
Cover of the book ABC of Emergency Differential Diagnosis by Dave Shackleford
Cover of the book Be Brilliant Every Day by Dave Shackleford
Cover of the book The Onward Workbook by Dave Shackleford
Cover of the book Information, Technology, and Innovation by Dave Shackleford
Cover of the book Green Political Theory by Dave Shackleford
Cover of the book Native America by Dave Shackleford
Cover of the book Smart Giving Is Good Business by Dave Shackleford
Cover of the book Teaching Adults by Dave Shackleford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy