官术网_书友最值得收藏!

Summary

This chapter introduced you to the "whys" of Hyper-V security and provided a brief introduction to the overall risks that almost all security systems face, and discussed generic responses. It also covered Hyper-V terminology and the available installation modes for the hypervisor.

In the next chapter, we'll dive right into Hyper-V security with a look at securing the physical host that runs the hypervisor.

主站蜘蛛池模板: 通州区| 都兰县| 晋中市| 申扎县| 读书| 隆子县| 湖南省| 镇赉县| 夏津县| 弋阳县| 卫辉市| 景洪市| 焉耆| 新丰县| 嘉鱼县| 西乌珠穆沁旗| 南岸区| 湖北省| 庆元县| 台中县| 辽阳市| 东明县| 钟山县| 阿合奇县| 吴桥县| 吴江市| 嘉兴市| 平武县| 淮滨县| 大足县| 佛教| 防城港市| 济南市| 长顺县| 靖远县| 东平县| 洛隆县| 逊克县| 冕宁县| 新巴尔虎左旗| 九龙城区|