Securing the virtual environment
Language: ENG Publication details: New Delhi Wiley India 2012Edition: 1stDescription: 425 p. | Binding - Paperback |ISBN:- 978-81-265-3605-4
- 5.8 OTT/WAL DDC23
| Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Books
|
School of Engineering & Technology Reference Section | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | E11040 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11041 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11042 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11043 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 OTT/WAL (Browse shelf(Opens below)) | Available | E11044 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE491 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE492 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE493 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE494 | |
AV Material
|
School of Engineering & Technology AV Materials | Reference | 005.8 OTT/WAL (Browse shelf(Opens below)) | Not For Loan | AE495 |
This book introduces the reader to an anatomy of attacks aimed at the virtual environment and the steps necessary for defense. Readers will discover how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend against attacks. Every enterprise has differing needs for their use of a particular vendor's virtual computing product. Because of this, the authors present the virtual environment as the overarching technology to cover every enterprise's needs.
There are no comments on this title.