VMware vSphere and Virtual Infrastructure Security

Securing the Virtual Environment

Nonfiction, Computers, Operating Systems, Unix
Cover of the book VMware vSphere and Virtual Infrastructure Security by Edward Haletky, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Edward Haletky ISBN: 9780136083207
Publisher: Pearson Education Publication: June 22, 2009
Imprint: Prentice Hall Language: English
Author: Edward Haletky
ISBN: 9780136083207
Publisher: Pearson Education
Publication: June 22, 2009
Imprint: Prentice Hall
Language: English

Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise

 

As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere.

 

This book reflects the same hands-on approach that made Haletky’s VMware ESX Server in the Enterprise so popular with working professionals. Haletky doesn’t just reveal where you might be vulnerable; he tells you exactly what to do and how to reconfigure your infrastructure to address the problem.

 

VMware vSphere and Virtual Infrastructure Security begins by reviewing basic server vulnerabilities and explaining how security differs on VMware virtual servers and related products. Next, Haletky drills deep into the key components of a VMware installation, identifying both real and theoretical exploits, and introducing effective countermeasures.

Coverage includes

•    Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce

•    Discovering which security threats the vmkernel does (and doesn’t) address

•    Learning how VMsafe enables third-party security tools to access the vmkernel API

•    Understanding the security implications of VMI, paravirtualization, and VMware Tools

•    Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more

•    Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion

•    Securing the deployment and management of virtual machines across the network

•    Mitigating risks associated with backup, performance management, and other day-to-day operations

•    Using multiple security zones and other advanced virtual network techniques

•    Securing Virtual Desktop Infrastructure (VDI)

•    Auditing virtual infrastructure, and conducting forensic investigations after a possible breach

 

 

informit.com/ph      www.Astroarch.com

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise

 

As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere.

 

This book reflects the same hands-on approach that made Haletky’s VMware ESX Server in the Enterprise so popular with working professionals. Haletky doesn’t just reveal where you might be vulnerable; he tells you exactly what to do and how to reconfigure your infrastructure to address the problem.

 

VMware vSphere and Virtual Infrastructure Security begins by reviewing basic server vulnerabilities and explaining how security differs on VMware virtual servers and related products. Next, Haletky drills deep into the key components of a VMware installation, identifying both real and theoretical exploits, and introducing effective countermeasures.

Coverage includes

•    Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce

•    Discovering which security threats the vmkernel does (and doesn’t) address

•    Learning how VMsafe enables third-party security tools to access the vmkernel API

•    Understanding the security implications of VMI, paravirtualization, and VMware Tools

•    Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more

•    Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion

•    Securing the deployment and management of virtual machines across the network

•    Mitigating risks associated with backup, performance management, and other day-to-day operations

•    Using multiple security zones and other advanced virtual network techniques

•    Securing Virtual Desktop Infrastructure (VDI)

•    Auditing virtual infrastructure, and conducting forensic investigations after a possible breach

 

 

informit.com/ph      www.Astroarch.com

More books from Pearson Education

Cover of the book Exam Ref 70-742 Identity with Windows Server 2016 by Edward Haletky
Cover of the book Solid Code by Edward Haletky
Cover of the book Understanding Arbitrage by Edward Haletky
Cover of the book Microsoft SharePoint 2013 Pocket Guide by Edward Haletky
Cover of the book The Financial Times Guide to Selecting Shares that Perform by Edward Haletky
Cover of the book Easy Mac OS X Lion by Edward Haletky
Cover of the book Design and Implementation of Intelligent Manufacturing Systems by Edward Haletky
Cover of the book Modeling Techniques in Predictive Analytics with Python and R by Edward Haletky
Cover of the book CCNA Security (640-554) Portable Command Guide by Edward Haletky
Cover of the book Food Photography: From Snapshots to Great Shots by Edward Haletky
Cover of the book Ocean and Seabed Acoustics by Edward Haletky
Cover of the book iPad and iPhone Tips and Tricks (covers iPhones and iPads running iOS 8) by Edward Haletky
Cover of the book Microsoft OneNote Step by Step by Edward Haletky
Cover of the book Thinking Security by Edward Haletky
Cover of the book CCNA Cybersecurity Operations Companion Guide by Edward Haletky
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy