A step-by-step guide to identifying and defending against attacks on the virtual environmentExamines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack
Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense
Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations
Accompanying DVD includes all the recipes plus valuable tools for penetration testing
As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts.
This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
Unless otherwise noted above, most orders ship within 1 to 2 days. We will promptly notify you if there is a stock problem with any items on your order and provide you with an estimated delivery date. If you have a firm need by date, please provide such information in the comment section at checkout.
Page Count (est.): 425
Pub Date: 4/20/2012