官术网_书友最值得收藏!

Chapter 1. Introducing Hyper-V Security

One of the most difficult tribulations in the entire realm of computing is security. Computers are tools, and just like any tool, they are designed to be used. Unfortunately, not every usage is proper, and not every computer should be accessed by just anyone. A computer really has no way to classify proper usage against improper usage, or differentiate between a valid user and an unauthorized user any more than a hammer would. The act of securing them is quite literally an endeavor to turn them against their purpose.

Hyper-V adds new dimensions to the security problem. Virtual machines have protection options that mirror their physical counterparts, but present unique challenges. The hypervisor presents challenges of its own, both in its role as the host for those virtual machines and through the management operating system that manifests it.

In this chapter, we'll cover:

  • The importance of Hyper-V security
  • Basic security concerns
  • A starting point to security
  • The terminology of Hyper-V
  • Acquiring Hyper-V
主站蜘蛛池模板: 化隆| 江达县| 澄迈县| 香港| 通山县| 揭阳市| 汨罗市| 霍林郭勒市| 壶关县| 理塘县| 彭山县| 泰顺县| 醴陵市| 韶山市| 特克斯县| 冕宁县| 芜湖县| 白银市| 通许县| 巴青县| 高尔夫| 抚顺县| 于都县| 云南省| 潞城市| 台山市| 离岛区| 南平市| 高邮市| 东明县| 林州市| 齐齐哈尔市| 辉县市| 包头市| 沙雅县| 腾冲县| 罗平县| 龙门县| 和林格尔县| 龙游县| 阳原县|