Cargando…

Securing the virtual environment: how to defend the enterprise against attack

A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professional...

Descripción completa

Detalles Bibliográficos
Autores principales: Ottenheimer, Davi, Wallace, Matthew
Lenguaje:eng
Publicado: John Wiley & Sons 2012
Materias:
Acceso en línea:http://cds.cern.ch/record/1486796
_version_ 1780926175134089216
author Ottenheimer, Davi
Wallace, Matthew
author_facet Ottenheimer, Davi
Wallace, Matthew
author_sort Ottenheimer, Davi
collection CERN
description A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models an
id cern-1486796
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2012
publisher John Wiley & Sons
record_format invenio
spelling cern-14867962021-04-22T00:15:53Zhttp://cds.cern.ch/record/1486796engOttenheimer, DaviWallace, MatthewSecuring the virtual environment: how to defend the enterprise against attackComputing and ComputersA step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models anJohn Wiley & Sonsoai:cds.cern.ch:14867962012
spellingShingle Computing and Computers
Ottenheimer, Davi
Wallace, Matthew
Securing the virtual environment: how to defend the enterprise against attack
title Securing the virtual environment: how to defend the enterprise against attack
title_full Securing the virtual environment: how to defend the enterprise against attack
title_fullStr Securing the virtual environment: how to defend the enterprise against attack
title_full_unstemmed Securing the virtual environment: how to defend the enterprise against attack
title_short Securing the virtual environment: how to defend the enterprise against attack
title_sort securing the virtual environment: how to defend the enterprise against attack
topic Computing and Computers
url http://cds.cern.ch/record/1486796
work_keys_str_mv AT ottenheimerdavi securingthevirtualenvironmenthowtodefendtheenterpriseagainstattack
AT wallacematthew securingthevirtualenvironmenthowtodefendtheenterpriseagainstattack