Red Hat Enterprise Linux 7 Virtualization Security Guide
β Scribed by Radvan S., Richardson T., Moore P.
- Tongue
- English
- Leaves
- 18
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Securing your virtual environment
T his guide provides an overview of virtualization security technologies provided by Red Hat. It also
provides recommendations for securing hosts, guests, and shared infrastructure and resources in
virtualized environments.
β¦ Subjects
ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ°;ΠΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΠ°;Linux / Unix;CentOS / Red Hat Enterprise Linux
π SIMILAR VOLUMES
A Guide to Securing Red Hat Enterprise Linux 7<br/>This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Red Hat Enterprise Linux but detailing conce
Installing, configuring, and managing virtual machines on a Red Hat Enterprise Linux physical machine<br/>This guide instructs ho w to co nfigure a Red Hat Enterprise Linux 7 ho st physical machine and<br/>ho w to install and co nfigure guest virtual machines with different distributio ns, using the
Red Hat Enterprise Linux 7 Virtualization Tuning and Optimization Guide<br/>T he Red Hat Enterprise Linux Virtualization T uning and Optimization Guide covers KVM and virtualization performance. Within this guide you can find tips and suggestions for making full use of<br/>KVM performance features a