Securing the virtual environment : how to defend the enterprise against attack /
By: Ottenheimer, Davi
Material type: BookPublisher: Indianapolis, IN : Wiley Pub., Inc., c2012.Edition: 1st ed.Description: xxvi, 425 p. : ill. ; 23 cm. +.ISBN: 9781118155486; 1118155483 (pbk : alk. paper)Program: CSCI262Subject(s): Computer networks -- Security measures | Information technology -- ManagementDDC classification: 005.8 OT SE Online resources: Location Map
Summary:
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important.
Item type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.8 OT SE (Browse shelf) | Available | T0045834 |
Total holds: 0
, Shelving location: Main Collection Close shelf browser
005.8 OP EN Open source intelligence investigation : | 005.8 OR HA Hacker techniques, tools, and incident handling | 005.8 OR PE Penetration testing : | 005.8 OT SE Securing the virtual environment : | 005.8 PA CO Corporate computer and network security / | 005.8 PE AN Anonymous communication networks : | 005.8 PE IN Information security policies, procedures, and standards : |
1 x DVD.
Virtualized Environment Attacks -- Attacking from the Outside -- Making the Complex Simple -- Denial of Service -- Abusing the Hypervisor -- Finding Leaks and Obtaining a Side Channel -- Logging and Orchestration -- Forcing an Interception -- Abusing Software as a Service -- Building Compliance into Virtual and Cloud Environments -- Appendix A Building a Virtual Attack Test Lab -- Appendix B About the Media.
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important.
CSCI262