Normal view MARC view ISBD view

Securing the virtual environment

By: Ottenheimer, Davi.
Contributor(s): Wallace, Matthew.
Publisher: New Delhi Wiley India 2012Edition: 1st.Description: 425 p. | Binding - Paperback |.ISBN: 978-81-265-3605-4.Subject(s): Computer EngineeringDDC classification: 5.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
 Text Books Text Books School of Engineering & Technology
Reference Section
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan E11040
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 OTT/WAL (Browse shelf) Available E11041
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 OTT/WAL (Browse shelf) Available E11042
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 OTT/WAL (Browse shelf) Available E11043
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 OTT/WAL (Browse shelf) Available E11044
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan AE491
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan AE492
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan AE493
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan AE494
AV Material AV Material School of Engineering & Technology
AV Materials
Reference 005.8 OTT/WAL (Browse shelf) Not For Loan AE495
Total holds: 0

This book introduces the reader to an anatomy of attacks aimed at the virtual environment and the steps necessary for defense. Readers will discover how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend against attacks. Every enterprise has differing needs for their use of a particular vendor's virtual computing product. Because of this, the authors present the virtual environment as the overarching technology to cover every enterprise's needs.

There are no comments for this item.

Log in to your account to post a comment.
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha