Securing the virtual environment
- 1st
- New Delhi Wiley India 2012
- 425 p. | Binding - Paperback |
This book introduces the reader to an anatomy of attacks aimed at the virtual environment and the steps necessary for defense. Readers will discover how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend against attacks. Every enterprise has differing needs for their use of a particular vendor's virtual computing product. Because of this, the authors present the virtual environment as the overarching technology to cover every enterprise's needs.