官术网_书友最值得收藏!

  • Hyper-V Security
  • Eric Siron Andy Syrewicze
  • 169字
  • 2021-08-05 16:48:31

Chapter 1. Introducing Hyper-V Security

One of the most difficult tribulations in the entire realm of computing is security. Computers are tools, and just like any tool, they are designed to be used. Unfortunately, not every usage is proper, and not every computer should be accessed by just anyone. A computer really has no way to classify proper usage against improper usage, or differentiate between a valid user and an unauthorized user any more than a hammer would. The act of securing them is quite literally an endeavor to turn them against their purpose.

Hyper-V adds new dimensions to the security problem. Virtual machines have protection options that mirror their physical counterparts, but present unique challenges. The hypervisor presents challenges of its own, both in its role as the host for those virtual machines and through the management operating system that manifests it.

In this chapter, we'll cover:

  • The importance of Hyper-V security
  • Basic security concerns
  • A starting point to security
  • The terminology of Hyper-V
  • Acquiring Hyper-V
主站蜘蛛池模板: 霍邱县| 衢州市| 名山县| 龙海市| 平度市| 阿鲁科尔沁旗| 安西县| 吴川市| 寿光市| 东明县| 渝北区| 抚远县| 若羌县| 思茅市| 湘潭市| 德阳市| 上饶市| 太谷县| 霞浦县| 邢台县| 江孜县| 泗阳县| 阿瓦提县| 张家港市| 娱乐| 高清| 依安县| 安龙县| 定日县| 乐至县| 息烽县| 渝北区| 黄梅县| 石首市| 增城市| 大新县| 自治县| 思南县| 兴仁县| 岑溪市| 甘孜县|