- Hyper-V Security
- Eric Siron Andy Syrewicze
- 65字
- 2021-08-05 16:48:32
Summary
This chapter introduced you to the "whys" of Hyper-V security and provided a brief introduction to the overall risks that almost all security systems face, and discussed generic responses. It also covered Hyper-V terminology and the available installation modes for the hypervisor.
In the next chapter, we'll dive right into Hyper-V security with a look at securing the physical host that runs the hypervisor.
推薦閱讀
- Oracle SOA Governance 11g Implementation
- 構(gòu)建高質(zhì)量的C#代碼
- 過(guò)程控制工程及仿真
- 嵌入式Linux上的C語(yǔ)言編程實(shí)踐
- 智能工業(yè)報(bào)警系統(tǒng)
- 工業(yè)機(jī)器人操作與編程
- Ceph:Designing and Implementing Scalable Storage Systems
- 網(wǎng)絡(luò)管理工具實(shí)用詳解
- 會(huì)聲會(huì)影X4中文版從入門到精通
- Spark大數(shù)據(jù)商業(yè)實(shí)戰(zhàn)三部曲:內(nèi)核解密|商業(yè)案例|性能調(diào)優(yōu)
- Mastering OpenStack(Second Edition)
- Redash v5 Quick Start Guide
- 計(jì)算機(jī)硬件技術(shù)基礎(chǔ)學(xué)習(xí)指導(dǎo)與練習(xí)
- 開(kāi)放自動(dòng)化系統(tǒng)應(yīng)用與實(shí)戰(zhàn):基于標(biāo)準(zhǔn)建模語(yǔ)言IEC 61499
- 系統(tǒng)安裝、維護(hù)與數(shù)據(jù)備份技巧