Extent:
Online-Ressource (xxii, 334 p.)
Type of publication: Book / Working Paper
Language: English
Notes:
Includes index. - Electronic reproduction; Palo Alto, Calif; ebrary; 2011; Available via World Wide Web; Access may be limited to ebrary affiliated libraries
Virtualization Security; Contents; Chapter 1 Fundamentals of Virtualization Security; Virtualization Architecture; Threats to a Virtualized Environment; Operational Threats; Malware-Based Threats; VM Escape; Vulnerabilities in Virtualization Platforms; How Security Must Adapt to Virtualization; Challenges for Securing Virtualized Environments; Challenges of Vulnerability Testing in a Virtualized Environment; Chapter 2 Securing Hypervisors; Hypervisor Configuration and Security; Configuring VMware ESXi; Patching VMware ESXi; Securing Communications in VMware ESXi
Change and Remove Default Settings on VMware ESXiEnable Operational Security on VMware ESXi; Secure and Monitor Critical Configuration Files in VMware ESXi; Secure Local Users and Groups on VMware ESXi; Lock Down Access to Hypervisor Console; Configuring Microsoft Hyper-V on Windows Server 2008; Patching Hyper-V; Securing Communications with Hyper-V; Changing Hyper-V Default Settings; Enabling Operational Security for Hyper-V; Securing and Monitoring Critical Configuration Files for Hyper-V; Secure Local Hyper-V Users and Groups; Lock Down Access to the Hyper-V Hypervisor Platform
Configuring Citrix XenServerPatching XenServer; Secure Communications with XenServer; Change XenServer Default Settings; Enabling XenServer Operational Security; Secure and Monitor Critical XenServer Configuration Files; Secure Local Users and Groups; Lock Down Access to the XenServer Platform; Chapter 3 Designing Virtual Networks for Security; Comparing Virtual and Physical Networks; Virtual Network Design Elements; Physical vs. Virtual Networks; Virtual Network Security Considerations; Important Security Elements; Architecture Considerations; Configuring Virtual Switches for Security
Defining Separate vSwitches and Port GroupsConfiguring VLANs and Private VLANs for Network Segmentation; Limiting Virtual Network Ports in Use; Implementing Native Virtual Networking Security Policies; Securing iSCSI Storage Network Connections; Integrating with Physical Networking; Chapter 4 Advanced Virtual Network Operations; Network Operational Challenges; Network Operations in VMware vSphere; Load Balancing in vSphere Virtual Environments; Traffic Shaping and Network Performance in VMware vSphere; Creating a Sound Network Monitoring Strategy in VMware vSphere
Network Operations in Microsoft Hyper-VLoad Balancing in Hyper-V Virtual Environments; Traffic Shaping and Network Performance in Hyper-V; Creating a Sound Network Monitoring Strategy in Hyper-V; Network Operations in Citrix XenServer; Load Balancing in XenServer Virtual Environments; Traffic Shaping and Network Performance in XenServer; Creating a Sound Network Monitoring Strategy in XenServer; Chapter 5 Virtualization Management and Client Security; General Security Recommendations for Management Platforms; Network Architecture for Virtualization Management Servers; VMware vCenter
vCenter Service Account
ISBN: 978-1-118-33375-4 ; 978-1-118-28812-2 ; 978-1-118-28812-2
Source:
ECONIS - Online Catalogue of the ZBW
Persistent link: https://www.econbiz.de/10012683296