- Hyper-V Security
- Eric Siron Andy Syrewicze
- 169字
- 2021-08-05 16:48:31
Chapter 1. Introducing Hyper-V Security
One of the most difficult tribulations in the entire realm of computing is security. Computers are tools, and just like any tool, they are designed to be used. Unfortunately, not every usage is proper, and not every computer should be accessed by just anyone. A computer really has no way to classify proper usage against improper usage, or differentiate between a valid user and an unauthorized user any more than a hammer would. The act of securing them is quite literally an endeavor to turn them against their purpose.
Hyper-V adds new dimensions to the security problem. Virtual machines have protection options that mirror their physical counterparts, but present unique challenges. The hypervisor presents challenges of its own, both in its role as the host for those virtual machines and through the management operating system that manifests it.
In this chapter, we'll cover:
- The importance of Hyper-V security
- Basic security concerns
- A starting point to security
- The terminology of Hyper-V
- Acquiring Hyper-V
- 大數據技術與應用基礎
- 中文版Photoshop CS5數碼照片處理完全自學一本通
- 嵌入式系統應用
- Getting Started with MariaDB
- Dreamweaver CS3網頁設計與網站建設詳解
- Hands-On Machine Learning with TensorFlow.js
- 基于Xilinx ISE的FPAG/CPLD設計與應用
- Photoshop行業應用基礎
- 液壓機智能故障診斷方法集成技術
- Unreal Development Kit Game Design Cookbook
- Java組件設計
- Puppet 3 Beginner’s Guide
- 計算機應用基礎學習指導與練習(Windows XP+Office 2003)
- ARM嵌入式開發實例
- Learning OpenShift