- Hyper-V Security
- Eric Siron Andy Syrewicze
- 169字
- 2021-08-05 16:48:31
Chapter 1. Introducing Hyper-V Security
One of the most difficult tribulations in the entire realm of computing is security. Computers are tools, and just like any tool, they are designed to be used. Unfortunately, not every usage is proper, and not every computer should be accessed by just anyone. A computer really has no way to classify proper usage against improper usage, or differentiate between a valid user and an unauthorized user any more than a hammer would. The act of securing them is quite literally an endeavor to turn them against their purpose.
Hyper-V adds new dimensions to the security problem. Virtual machines have protection options that mirror their physical counterparts, but present unique challenges. The hypervisor presents challenges of its own, both in its role as the host for those virtual machines and through the management operating system that manifests it.
In this chapter, we'll cover:
- The importance of Hyper-V security
- Basic security concerns
- A starting point to security
- The terminology of Hyper-V
- Acquiring Hyper-V
- PPT,要你好看
- Getting Started with MariaDB
- 計(jì)算機(jī)控制技術(shù)
- 輕松學(xué)Java
- SharePoint 2010開發(fā)最佳實(shí)踐
- 嵌入式操作系統(tǒng)
- MATLAB/Simulink權(quán)威指南:開發(fā)環(huán)境、程序設(shè)計(jì)、系統(tǒng)仿真與案例實(shí)戰(zhàn)
- 網(wǎng)站前臺(tái)設(shè)計(jì)綜合實(shí)訓(xùn)
- 內(nèi)模控制及其應(yīng)用
- Windows Server 2003系統(tǒng)安全管理
- Mastering Geospatial Analysis with Python
- 在實(shí)戰(zhàn)中成長(zhǎng):C++開發(fā)之路
- 青少年VEX IQ機(jī)器人實(shí)訓(xùn)課程(初級(jí))
- 基于Proteus的PIC單片機(jī)C語言程序設(shè)計(jì)與仿真
- 樂高創(chuàng)意機(jī)器人教程(中級(jí) 上冊(cè) 10~16歲) (青少年iCAN+創(chuàng)新創(chuàng)意實(shí)踐指導(dǎo)叢書)