Securing the virtual environment
By: Ottenheimer, Davi.
Contributor(s): Wallace, Matthew.
Publisher: New Delhi Wiley India 2012Edition: 1st.Description: 425 p. | Binding - Paperback |.ISBN: 978-81-265-3605-4.Subject(s): Computer EngineeringDDC classification: 5.8Item type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Text Books | School of Engineering & Technology Reference Section | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | E11040 | ||
Text Books | School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf) | Available | E11041 | ||
Text Books | School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf) | Available | E11042 | ||
Text Books | School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf) | Available | E11043 | ||
Text Books | School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf) | Available | E11044 | ||
AV Material | School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | AE491 | ||
AV Material | School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | AE492 | ||
AV Material | School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | AE493 | ||
AV Material | School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | AE494 | ||
AV Material | School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf) | Not For Loan | AE495 |
This book introduces the reader to an anatomy of attacks aimed at the virtual environment and the steps necessary for defense. Readers will discover how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend against attacks. Every enterprise has differing needs for their use of a particular vendor's virtual computing product. Because of this, the authors present the virtual environment as the overarching technology to cover every enterprise's needs.
There are no comments for this item.