官术网_书友最值得收藏!

What this book covers

Chapter 1, Introducing Hyper-V Security, starts by discussing the important concepts of security in a Hyper-V environment.

Chapter 2, Securing the Host, deals with securing the management operating system. A Hyper-V system runs a critical hypervisor, but it also runs a server operating system that has its own security requirements.

Chapter 3, Securing Virtual Machines from the Hypervisor, focuses on Hyper-V security from the perspective of the hypervisor.

Chapter 4, Securing Virtual Machines, turns the attention from the hypervisor to its guests. This includes not only securing them as virtual machines, but as computers that run typical operating systems and applications with security needs of their own.

Chapter 5, Securing the Network, covers a variety of methods that are at your disposal to secure network communications for both hosts and guests.

Chapter 6, Securing Hyper-V Storage, details the considerations and techniques involved for the protection of your virtual machines' data.

Chapter 7, Hyper-V Security and System Center VMM, explores System Center Virtual Machine Manager and discusses how having SCVMM in play changes the security discussion.

Chapter 8, Secure Hybrid Cloud Management through App Controller, discusses system requirements, installation, and configuration of App Controller, including its role-based security model for multiple public/private clouds.

主站蜘蛛池模板: 怀柔区| 青河县| 枝江市| 剑河县| 峨山| 东光县| 玉树县| 尼木县| 晋江市| 吉木乃县| 安康市| 明溪县| 昌吉市| 古丈县| 武山县| 高青县| 西盟| 葫芦岛市| 南澳县| 元阳县| 前郭尔| 肥东县| 惠东县| 曲阳县| 海伦市| 定襄县| 阳曲县| 井研县| 潼关县| 郑州市| 邹平县| 耒阳市| 名山县| 秭归县| 丹东市| 平山县| 墨脱县| 阳西县| 赞皇县| 湘潭市| 宁蒗|