Securing the Virtual Environment: How to Defend the Enterprise Against Attack

Securing the Virtual Environment: How to Defend the Enterprise Against Attack

Davi Ottenheimer, Matthew Wallace


A step by step advisor to selecting and protecting opposed to assaults at the digital environment
As progressively more information is moved into digital environments the necessity to safe them turns into more and more very important. worthy for carrier companies in addition to firm and small company IT execs the publication deals a large glance throughout virtualization utilized in numerous industries in addition to a slim view of vulnerabilities designated to digital environments. A spouse DVD is incorporated with recipes and trying out scripts.

• Examines the adaptation in a digital version as opposed to conventional computing versions and the correct know-how and methods to shield it from attack
• Dissects and exposes assaults exact on the digital atmosphere and the stairs beneficial for defense
• Covers details defense in digital environments: development a digital assault lab, discovering leaks, getting a side-channel, denying or compromising companies, abusing the hypervisor, forcing an interception, and spreading infestations
• Accompanying DVD comprises hands-on examples and code
• This how-to consultant palms IT managers, owners, and designers of digital environments with the instruments they should shield opposed to universal threats.

Show sample text content

Download sample