𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Virtualization Security: Protecting Virtualized Environments

✍ Scribed by Dave Shackleford


Publisher
Sybex
Year
2012
Tongue
English
Leaves
360
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.

  • Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
  • Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
  • Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
  • Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.


πŸ“œ SIMILAR VOLUMES


Virtualization security: protecting virt
✍ Dave Shackleford πŸ“‚ Library πŸ“… 2012 πŸ› Sybex 🌐 English

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. Whats more, the technologi

Writing Virtual Environments for Softwar
✍ Clinton Jeffery, Jafar Al-Gharaibeh (auth.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer-Verlag New York 🌐 English

<p>Writing Virtual Environments for Software Visualization book describes the software for a networked, 3D multi-user virtual environment that allows users to create and share remotely visualizations of program behavior. Collaborative virtual environments such as World of Warcraft or Second Life are

Virtual Reality – Real Visuality: Virtua
✍ AndrΓ‘s Benedek, Ágnes Veszelszki (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Peter Lang 🌐 English

This book raises the question of what visuality really is and how it is possible to explain it. Virtual reality is connected to our current environment with multiple ties. It affects the everyday operation of the media and hence all of our lives. The authors connect the concepts of pictorial turn an

VMware vSphere and virtual infrastructur
✍ Haletky, Edward L πŸ“‚ Library πŸ“… 2009 πŸ› Prentice Hall 🌐 English

Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about se