Cargando…
Securing the virtual environment: how to defend the enterprise against attack
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professional...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
John Wiley & Sons
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1486796 |
_version_ | 1780926175134089216 |
---|---|
author | Ottenheimer, Davi Wallace, Matthew |
author_facet | Ottenheimer, Davi Wallace, Matthew |
author_sort | Ottenheimer, Davi |
collection | CERN |
description | A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models an |
id | cern-1486796 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2012 |
publisher | John Wiley & Sons |
record_format | invenio |
spelling | cern-14867962021-04-22T00:15:53Zhttp://cds.cern.ch/record/1486796engOttenheimer, DaviWallace, MatthewSecuring the virtual environment: how to defend the enterprise against attackComputing and ComputersA step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models anJohn Wiley & Sonsoai:cds.cern.ch:14867962012 |
spellingShingle | Computing and Computers Ottenheimer, Davi Wallace, Matthew Securing the virtual environment: how to defend the enterprise against attack |
title | Securing the virtual environment: how to defend the enterprise against attack |
title_full | Securing the virtual environment: how to defend the enterprise against attack |
title_fullStr | Securing the virtual environment: how to defend the enterprise against attack |
title_full_unstemmed | Securing the virtual environment: how to defend the enterprise against attack |
title_short | Securing the virtual environment: how to defend the enterprise against attack |
title_sort | securing the virtual environment: how to defend the enterprise against attack |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1486796 |
work_keys_str_mv | AT ottenheimerdavi securingthevirtualenvironmenthowtodefendtheenterpriseagainstattack AT wallacematthew securingthevirtualenvironmenthowtodefendtheenterpriseagainstattack |