Securing your virtual environment<br/>T his guide provides an overview of virtualization security technologies provided by Red Hat. It also<br/>provides recommendations for securing hosts, guests, and shared infrastructure and resources in<br/>virtualized environments.
Red Hat Enterprise Linux 7 Virtualization Deployment and Administration Guide
✍ Scribed by Novich R., Richardson T., Radvan S.
- Tongue
- English
- Leaves
- 566
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Installing, configuring, and managing virtual machines on a Red Hat Enterprise Linux physical machine
This guide instructs ho w to co nfigure a Red Hat Enterprise Linux 7 ho st physical machine and
ho w to install and co nfigure guest virtual machines with different distributio ns, using the KVM
hyperviso r. Also included PCI device co nfiguratio n, SR-IOV, netwo rking, sto rage, device and
guest virtual machine management, as well as tro ublesho o ting, co mpatibility and restrictions.
✦ Subjects
Библиотека;Компьютерная литература;Linux / Unix;CentOS / Red Hat Enterprise Linux
📜 SIMILAR VOLUMES
A guide to the GNOME 3 Desktop migration planning and administration<br/>on Red Hat Enterprise Linux 7.<br/>T he Desktop Migration and Administration Guide documents the GNOME 3 Desktop migration planning, deployment, configuration, and administration on Red Hat Enterprise Linux<br/>7. It is oriente
Red Hat Enterprise Linux 7 Virtualization Tuning and Optimization Guide<br/>T he Red Hat Enterprise Linux Virtualization T uning and Optimization Guide covers KVM and virtualization performance. Within this guide you can find tips and suggestions for making full use of<br/>KVM performance features a
Deployment, Configuration and Administration of Red Hat Enterprise Linux 7<br/>The System Administrator's Guide documents relevant information regarding the deployment,<br/>configuration and administration of Red Hat Enterprise Linux<br/>7. It is oriented to wards system<br/>administrators with a ba
Basic and advanced configuration of Security-Enhanced Linux (SELinux)<br/>This bo o ks co nsists o f two parts: SELinux and Managing Co nfined Services. The former describes the basics and principles upo n which SELinux functio ns, the latter is more focused on practical tasks to set up and co nfigu