Virtualization Security

Protecting Virtualized Environments

Nonfiction, Computers, Operating Systems
Cover of the book Virtualization Security by Dave Shackleford, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dave Shackleford ISBN: 9781118331514
Publisher: Wiley Publication: November 8, 2012
Imprint: Sybex Language: English
Author: Dave Shackleford
ISBN: 9781118331514
Publisher: Wiley
Publication: November 8, 2012
Imprint: Sybex
Language: English

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

  • Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
  • Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
  • Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
  • Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

More books from Wiley

Cover of the book GSM/EDGE by Dave Shackleford
Cover of the book Deploying IPv6 in Broadband Access Networks by Dave Shackleford
Cover of the book Naked Forex by Dave Shackleford
Cover of the book Russia's Futures by Dave Shackleford
Cover of the book Collaborative Divorce Handbook by Dave Shackleford
Cover of the book Personal Branding For Dummies by Dave Shackleford
Cover of the book Consumer India by Dave Shackleford
Cover of the book Essentials of Supply Chain Management by Dave Shackleford
Cover of the book The New Prescriber by Dave Shackleford
Cover of the book The Ethics of War and Peace by Dave Shackleford
Cover of the book Stochastic Modeling and Analysis of Telecom Networks by Dave Shackleford
Cover of the book Mastering VBA for Microsoft Office 365 by Dave Shackleford
Cover of the book Paediatric Handbook by Dave Shackleford
Cover of the book Electrohydraulic Fracturing of Rocks by Dave Shackleford
Cover of the book The Wiley Blackwell Handbook of the Psychology of Positivity and Strengths-Based Approaches at Work by Dave Shackleford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy