Description: |
|
Product Description
Secure virtual environments using the proven Hacking Exposed methodology In Hacking Exposed Virtualization & Cloud Computing, leading virtualization security experts show you how to implement bulletproof virtualization security the battle-tested Hacking Exposed way. Learn how to defend against the sneakiest attacks by looking at your virtual infrastructure and hosts through the eyes of the intruder. This cutting-edge guide reveals, step-by-step, how hackers target exposed systems and gain access. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. The authors reveal how to prevent tomorrow’s catastrophe by learning how new flaws are discovered and abused by cyber-criminals. Plus, the book and companion website include Virtual Infrastructure API references with command syntax, security evaluation templates, and vital security tools. Hacking Exposed Virtualization & Cloud Computing - Covers the major vendors and technologies, including Xen, Microsoft, Cisco, and VMware
- Provides detailed explanations, best practices, and real-world examples to help organizations of all sizes create and secure a virtualized datacenter
- Is written by virtualization security experts and prominent international speakers, including Christofer Hoff of www.rationalsurvivability.com/blog
Comprehensive, expert coverage: Enterprise Virtualization & Cloud Computing; Virtualization & Cloud Computing Defined; Hypervisor/Virtual Machine Monitor Architecture; CPU Virtualization Extensions; Network and Storage Virtualization Architecture; Owning the Virtualized Enterprise; CPU & Chipsets; VMM/Hypervisor/Host; VMs/Guest; Control & Management Planes & APIs; Compromising the Cloud; Owning the Cloud for Fun and Profit; Infrastructure; Metastructure; Infostructure
|