Securing the virtual environment
Language: ENG Publication details: New Delhi Wiley India 2012Edition: 1stDescription: 425 p. | Binding - Paperback |ISBN:- 978-81-265-3605-4
- 5.8 OTT/WAL DDC23
| Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Books
|
School of Engineering & Technology Reference Section | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | E11040 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11041 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11042 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11043 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11044 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE491 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE492 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE493 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE494 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE495 |
Browsing School of Engineering & Technology shelves, Shelving location: Reference Section, Collection: Reference Close shelf browser (Hides shelf browser)
| 005.8 MAT/KUM Cloud security and privacy | 005.8 MCN Network security assessment | 005.8 MUN/LAK Investigating the cyber breach | 005.8 OTT/WAL Securing the virtual environment | 005.8 PFL/PFL Security in computing | 005.8 STA Cryptography and network security | 005.8 TRO Cybersecurity ops with bash |
This book introduces the reader to an anatomy of attacks aimed at the virtual environment and the steps necessary for defense. Readers will discover how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend against attacks. Every enterprise has differing needs for their use of a particular vendor's virtual computing product. Because of this, the authors present the virtual environment as the overarching technology to cover every enterprise's needs.
There are no comments on this title.