目錄(78章)
倒序
- 封面
- 版權(quán)頁
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing Hyper-V Security
- The importance of Hyper-V security
- Basic security concerns
- A starting point to security
- Hyper-V terminology
- Acquiring Hyper-V
- Summary
- Chapter 2. Securing the Host
- Understanding Hyper-V's architecture
- Choosing a management operating system
- Disabling unnecessary components
- Using the Windows Firewall
- Relying on domain security
- Leveraging Group Policy
- Using security software
- Configuring Windows Update
- Employing remote management tools
- Following general best practices
- Summary
- Chapter 3. Securing Virtual Machines from the Hypervisor
- Using the Hyper-V Administrators group
- Leveraging PowerShell Remoting
- Using custom PowerShell Remoting endpoints
- Summary
- Chapter 4. Securing Virtual Machines
- Understanding the security environment of VMs
- Leveraging Generation 2 virtual machines
- Employing anti-malware on a virtual machine
- Using Group Policy with virtual machines
- Limiting exposure with resource limitations
- Applying general best practices
- Summary
- Chapter 5. Securing the Network
- Understanding SSL encryption
- Leveraging network hardware
- Using the virtual switch's isolating technologies
- Employing Hyper-V virtual switch ACLs
- Configuring the Windows Firewall
- Using management tools remotely
- Using Hyper-V with IPsec
- Configuring virtual network adapter protections
- Encrypting cluster communications
- Securing Hyper-V Replica traffic
- Summary
- Chapter 6. Securing Hyper-V Storage
- Configuring NTFS security for VM storage
- Securing SMB 3.0 shares for VM storage
- Securing iSCSI connections
- Using Secure Boot
- Using BitLocker
- Understanding the role of backup
- Summary
- Chapter 7. Hyper-V Security and System Center VMM
- Enhancing Hyper-V host security through VMM
- Securing the VMM installation
- Network virtualization and multi-tenancy
- Providing secure self-service with the Windows Azure Pack
- Summary
- Chapter 8. Secure Hybrid Cloud Management through App Controller
- System requirements
- Installing App Controller
- App Controller's role-based security model
- Summary
- Index 更新時間:2021-08-05 16:48:46
推薦閱讀
- Hands-On Graph Analytics with Neo4j
- Go Machine Learning Projects
- Seven NoSQL Databases in a Week
- 數(shù)據(jù)挖掘方法及天體光譜挖掘技術(shù)
- AWS Administration Cookbook
- Java Web整合開發(fā)全程指南
- Mastering pfSense
- Mastering GitLab 12
- Hands-On Dashboard Development with QlikView
- 生物3D打?。簭尼t(yī)療輔具制造到細胞打印
- Web璀璨:Silverlight應(yīng)用技術(shù)完全指南
- Oracle 11g Anti-hacker's Cookbook
- 大數(shù)據(jù)時代的調(diào)查師
- 自動化生產(chǎn)線組建與調(diào)試(第2版):以亞龍YL-335B為例(三菱PLC版本)
- Orange'S:一個操作系統(tǒng)的實現(xiàn)
- 從虛擬化到云計算
- Hands-On Neural Networks with TensorFlow 2.0
- PostgreSQL Administration Cookbook(9.5-9.6 Edition)
- Learning Elastic Stack 6.0
- 一本書讀懂大數(shù)據(jù)(全彩圖解版)
- 51單片機C語言應(yīng)用開發(fā)三位一體實戰(zhàn)精講
- 數(shù)據(jù)庫應(yīng)用技術(shù):Access 2003
- Pentaho for Big Data Analytics
- Hands-On Deep Learning Architectures with Python
- 新編計算機導(dǎo)論(第2版)
- Web應(yīng)用項目開發(fā)
- Excel 2007公式、函數(shù)與圖表應(yīng)用
- 數(shù)據(jù)挖掘與機器學(xué)習(xí)
- 自己動手做交互系統(tǒng)
- Hands-On Big Data Modeling