Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

VMware vSphere and Virtual Infrastructure Security (eBook)

Securing the Virtual Environment
eBook Download: PDF
2009 | 1. Auflage
Pearson Education (Verlag)
978-0-13-814063-2 (ISBN)
Systemvoraussetzungen
28,83 inkl. MwSt
(CHF 28,15)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Complete Hands-On Help for Securing VMware Infrastructure-by Ed Haletky, Author of the #1 VMware ESX Deployment Guide

As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms.

This book reflects the same hands-on approach that made Haletky's VMware ESX Server in the Enterprise so popular with working professionals. Haletky doesn't just reveal where you might be vulnerable, he tells you exactly what to do and how to reconfigure your infrastructure to address the problem.

VMware Virtual Infrastructure Security begins by reviewing basic server vulnerabilities and explaining how security differs on VMware virtual servers and related products. Next, Haletky drills deep into the key components of a VMware installation, identifying both real and theoretical exploits, and introducing effective countermeasures. Coverage includes:

  • Viewing virtualization from the attacker's perspective, and understanding the new security problems it can introduce
  • Addressing VMware security holistically, with solutions that encompass all of your VMware and third-party virtualization products
  • Discovering which security threats the vmkernel does (and doesn't) address
  • Learning how VMsafe enables third-party security tools to access the vmkernel API
  • Understanding the security implications of VMI, paravirtualization, and VMware Tools
  • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more
  • Protecting clustered VI3 environments that use VMware High Availability, Dynamic Resource Scheduling, vMotion, and Storage vMotion
  • Securing the deployment and management of virtual machines across the network
  • Mitigating risks associated with backup, performance management, and other day-to-day operations
  • Using multiple security zones and other advanced virtual network techniques
  • Securing Virtual Desktop Infrastructure (VDI)
  • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach

    Until now, VMware professionals have struggled to find coherent, usable information for securing virtual infrastructure. This book fills that gap, providing realistic best practices for protecting even the most complex VMware environment.


    Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere. This book reflects the same hands-on approach that made Haletky's VMware ESX Server in the Enterprise so popular with working professionals. Haletky doesn't just reveal where you might be vulnerable; he tells you exactly what to do and how to reconfigure your infrastructure to address the problem. VMware vSphere and Virtual Infrastructure Security begins by reviewing basic server vulnerabilities and explaining how security differs on VMware virtual servers and related products. Next, Haletky drills deep into the key components of a VMware installation, identifying both real and theoretical exploits, and introducing effective countermeasures. Coverage includes * Viewing virtualization from the attacker's perspective, and understanding the new security problems it can introduce * Discovering which security threats the vmkernel does (and doesn't) address * Learning how VMsafe enables third-party security tools to access the vmkernel API * Understanding the security implications of VMI, paravirtualization, and VMware Tools * Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more * Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion * Securing the deployment and management of virtual machines across the network * Mitigating risks associated with backup, performance management, and other day-to-day operations * Using multiple security zones and other advanced virtual network techniques * Securing Virtual Desktop Infrastructure (VDI) * Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph | www.Astroarch.com
  • Erscheint lt. Verlag 10.6.2009
    Sprache englisch
    Themenwelt Informatik Betriebssysteme / Server Unix / Linux
    Informatik Netzwerke Sicherheit / Firewall
    ISBN-10 0-13-814063-4 / 0138140634
    ISBN-13 978-0-13-814063-2 / 9780138140632
    Haben Sie eine Frage zum Produkt?
    PDFPDF (Adobe DRM)

    Kopierschutz: Adobe-DRM
    Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
    Details zum Adobe-DRM

    Dateiformat: PDF (Portable Document Format)
    Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

    Systemvoraussetzungen:
    PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
    eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
    Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
    Geräteliste und zusätzliche Hinweise

    Buying eBooks from abroad
    For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

    Mehr entdecken
    aus dem Bereich
    Das umfassende Handbuch

    von Dirk Deimeke; Daniel van Soest; Stefan Kania; Peer Heinlein …

    eBook Download (2023)
    Rheinwerk Computing (Verlag)
    CHF 51,20
    das umfassende Handbuch

    von Michael Kofler

    eBook Download (2023)
    Rheinwerk Computing (Verlag)
    CHF 36,55
    Die wichtigen Befehle

    von Daniel J. Barrett

    eBook Download (2024)
    O'Reilly Verlag
    CHF 16,50