Anyone who is serious about virtualization security should certainly make sure that Securing the Virtual Environment: How to Defend the Enterprise Against Attack is on their reading list, and that of every security administrator in their company. (RSA Conference, 7th May)
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. * Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack * Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense * Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations * Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Versand:
Gratis
Innerhalb der USA
Versand:
EUR 3,80
Innerhalb der USA
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Bestandsnummer des Verkäufers 17428338-6
Anzahl: 1 verfügbar
Anbieter: Wonder Book, Frederick, MD, USA
Zustand: Good. Good condition. DVD included. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Bestandsnummer des Verkäufers E01A-03579
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.6. Bestandsnummer des Verkäufers G1118155483I3N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.6. Bestandsnummer des Verkäufers G1118155483I4N00
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!. Bestandsnummer des Verkäufers S_397108611
Anzahl: 1 verfügbar
Anbieter: Irish Booksellers, Portland, ME, USA
Zustand: Good. SHIPS FROM USA. Used books have different signs of use and do not include supplemental materials such as CDs, Dvds, Access Codes, charts or any other extra material. All used books might have various degrees of writing, highliting and wear and tear and possibly be an ex-library with the usual stickers and stamps. Dust Jackets are not guaranteed and when still present, they will have various degrees of tear and damage. All images are Stock Photos, not of the actual item. book. Bestandsnummer des Verkäufers 25-1118155483-G
Anzahl: 1 verfügbar
Anbieter: 369 Bookstore _[~ 369 Pyramid Inc ~]_, Dover, DE, USA
Softcover. Zustand: Good. A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and codeThis how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats. Bestandsnummer des Verkäufers AMPLE1118155483
Anzahl: 1 verfügbar
Anbieter: GoldenDragon, Houston, TX, USA
Paperback. Zustand: very good. Very Good Copy. Fast Shipment. Bestandsnummer des Verkäufers SilverDragon1118155483
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Paperback. Zustand: very good. Very Good Copy. Customer Service Guaranteed. Bestandsnummer des Verkäufers think_very_1118155483
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Paperback. Zustand: new. New Copy. Customer Service Guaranteed. Bestandsnummer des Verkäufers think1118155483
Anzahl: 1 verfügbar