官术网_书友最值得收藏!

Summary

This chapter introduced you to the "whys" of Hyper-V security and provided a brief introduction to the overall risks that almost all security systems face, and discussed generic responses. It also covered Hyper-V terminology and the available installation modes for the hypervisor.

In the next chapter, we'll dive right into Hyper-V security with a look at securing the physical host that runs the hypervisor.

主站蜘蛛池模板: 望奎县| 中超| 师宗县| 克拉玛依市| 阳谷县| 巫山县| 平阳县| 通榆县| 固阳县| 乌鲁木齐县| 安岳县| 望谟县| 孟州市| 沿河| 南江县| 平乡县| 绥江县| 临清市| 榆中县| 沂水县| 元氏县| 峨山| 铜鼓县| 佛学| 蓬安县| 科技| 会昌县| 静海县| 岑溪市| 秀山| 宁化县| 黑水县| 清涧县| 金山区| 得荣县| 西充县| 兰西县| 松溪县| 太和县| 惠安县| 桦南县|