- VMware vSphere Security Cookbook
- Mike Greer
- 254字
- 2021-08-05 17:16:01
Preface
This book features two topics that I have a keen interest in: security and virtualization. The virtualization space can be complex in its own right, and like other technological areas, adding sufficient security can prove to be quite labor intensive and often frustrating. As technology evolves, the idea of building an infrastructure or project in a secure manner from the beginning is still somewhat novel in its approach. While more security controls are available in products, I find that such controls and features continue to be underutilized or not implemented at all.
Consider the following: on receiving a plate of pasta at your local restaurant, you are generally asked, "Would you like cheese with that?" This simple scenario and the relationship between pasta and cheese is an apt metaphor for the way security is applied to the Information Technology (IT) infrastructure in many businesses today.
My core philosophy is to help those in need. By and large, given my profession, ensuring privacy and providing some form of data security seems the logical approach. I hope this cookbook that deals with security tasks specific to the VMware vSphere 5.5 product set will enable you to get a better understanding of the virtualization environment with step-by-step instructions.
This book covers implementing specific security features of the vSphere 5.5 virtualization platform in a step-by-step format. Each topic contains a high-level overview to give context to the cookbook recipes. This book is not intended to provide reference architectures or theories behind specific security topics implemented by vSphere.
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書(shū)第3版)
- Kali Linux Social Engineering
- Wireshark 2 Quick Start Guide
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- Mastering Kali Linux for Advanced Penetration Testing
- Learning Veeam? Backup & Replication for VMware vSphere
- .NET安全攻防指南(上冊(cè))
- Kali Linux Wireless Penetration Testing Cookbook
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 數(shù)據(jù)安全領(lǐng)域指南
- 解密數(shù)據(jù)恢復(fù)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 無(wú)線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- Bug Bounty Hunting Essentials
- Hands-On Artificial Intelligence for Cybersecurity