Research Library

Powered by

Feb 20, 2013
Feb 20, 2013
4 Page(s)

See all research from

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by:


    Hardening the hypervisor should really be viewed as a standard practice, much as it should be for enterprise servers of any importance.


    There are an incredible number of configuration options for the major platforms (ESXi, Hyper-V, and XenServer).


    This extract identifies the most fundamental principles, getting you to a sound security state that conforms to industry best practices.


    This is an extract from the book:

    Virtualization Security: Protecting Virtualized Environments

    By Dave Shackleford

    Published by Wiley



    30% Discount for Computer Weekly Members



    Click on the button below to download this extract and to obtain an exclusive discount code.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.