官术网_书友最值得收藏!

Summary

This chapter introduced you to the "whys" of Hyper-V security and provided a brief introduction to the overall risks that almost all security systems face, and discussed generic responses. It also covered Hyper-V terminology and the available installation modes for the hypervisor.

In the next chapter, we'll dive right into Hyper-V security with a look at securing the physical host that runs the hypervisor.

主站蜘蛛池模板: 盐源县| 绥宁县| 二连浩特市| 安阳县| 山阳县| 阿克苏市| 伊春市| 吉安市| 辉县市| 交城县| 寻甸| 宁陕县| 贵阳市| 苍山县| 怀集县| 安平县| 门头沟区| 天峻县| 犍为县| 瑞金市| 察哈| 泰顺县| 保定市| 甘肃省| 上栗县| 漠河县| 朝阳区| 秦皇岛市| 灵武市| 迁安市| 广宁县| 横山县| 桂林市| 深泽县| 信宜市| 吕梁市| 黔南| 沈丘县| 汉沽区| 楚雄市| 龙游县|