官术网_书友最值得收藏!

  • Hyper-V Security
  • Eric Siron Andy Syrewicze
  • 169字
  • 2021-08-05 16:48:31

Chapter 1. Introducing Hyper-V Security

One of the most difficult tribulations in the entire realm of computing is security. Computers are tools, and just like any tool, they are designed to be used. Unfortunately, not every usage is proper, and not every computer should be accessed by just anyone. A computer really has no way to classify proper usage against improper usage, or differentiate between a valid user and an unauthorized user any more than a hammer would. The act of securing them is quite literally an endeavor to turn them against their purpose.

Hyper-V adds new dimensions to the security problem. Virtual machines have protection options that mirror their physical counterparts, but present unique challenges. The hypervisor presents challenges of its own, both in its role as the host for those virtual machines and through the management operating system that manifests it.

In this chapter, we'll cover:

  • The importance of Hyper-V security
  • Basic security concerns
  • A starting point to security
  • The terminology of Hyper-V
  • Acquiring Hyper-V
主站蜘蛛池模板: 岳池县| 永昌县| 济南市| 子洲县| 汤阴县| 顺平县| 且末县| 民乐县| 博罗县| 宽城| 元谋县| 安仁县| 衡南县| 罗田县| 高台县| 宁远县| 祁连县| 洛浦县| 泸定县| 龙山县| 萍乡市| 汝州市| 蚌埠市| 连山| 三穗县| 佛冈县| 平度市| 顺昌县| 北京市| 开远市| 深圳市| 思南县| 云和县| 安康市| 磐安县| 苍南县| 阳江市| 肇东市| 万盛区| 昌吉市| SHOW|