Sorry, this item is currently unavailable.

Securing the Virtual Environment, Included DVD How to Defend the Enterprise Against Attack

ISBN: 9781118155486 | 1118155483
Edition: 1st
Format: Paperback
Publisher: Wiley
Pub. Date: 5/8/2012

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

Top 5 reasons to order all your textbooks from Knetbooks:

  • We have the lowest prices on thousands of popular textbooks
  • Free shipping both ways on ALL orders
  • Most orders ship within 48 hours
  • Need your book longer than expected? Extending your rental is simple
  • Our customer support team is always here to help
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. This volume, with a foreword by famed security expert Bruce Schneier, provides recipes for detecting and defending against a variety of attacks. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion CD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying CD includes all the recipes plus valuable tools for penetration testing This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.

Please wait while this item is added to your cart...