Скачать книгу - Virtualization Security. Protecting Virtualized Environments



Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor–VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer. Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.


Virtualization Essentials Virtualization Essentials

Автор: Matthew Portnoy

Год издания: 

Learn virtualization skills by building your own virtual machine Virtualization Essentials, Second Edition provides new and aspiring IT professionals with immersive training in working with virtualization environments. Clear, straightforward discussion simplifies complex concepts, and the hands-on tutorial approach helps you quickly get up to speed on the fundamentals. You'll begin by learning what virtualization is and how it works within the computing environment, then you'll dive right into building your own virtual machine. You'll learn how to set up the CPU, memory, storage, networking, and more as you master the skills that put you in-demand on the job market. Each chapter focuses on a specific goal, and concludes with review questions that test your understanding as well as suggested exercises that help you reinforce what you've learned. As more and more companies are leveraging virtualization, it's imperative that IT professionals have the skills and knowledge to interface with virtualization-centric infrastructures. This book takes a learning-by-doing approach to give you hands-on training and a core understanding of virtualization. Understand how virtualization works Create a virtual machine by scratch and migration Configure and manage basic components and supporting devices Develop the necessary skill set to work in today's virtual world Virtualization was initially used to build test labs, but its use has expanded to become best practice for a tremendous variety of IT solutions including high availability, business continuity, dynamic IT, and more. Cloud computing and DevOps rely on virtualization technologies, and the exponential spread of these and similar applications make virtualization proficiency a major value-add for any IT professional. Virtualization Essentials, Second Edition provides accessible, user-friendly, informative virtualization training for the forward-looking pro.


Protecting Clients from Fraud, Incompetence and Scams Protecting Clients from Fraud, Incompetence and Scams

Автор: Lance Wallach

Год издания: 

Protect your clients – and yourself – from all kinds of financial chicanery and stupidity with this vital new book It doesn't matter if a financial error was made because of malice or ignorance – the end result is that you lose money. Luckily, you don't have to sit idly and take it. If you have Protecting Clients from Fraud, Incompetence and Scams, you can identify and avoid the dysfunctional sectors of the financial industry, steer clear of the fallout from the Madoff Era, and guide your clients to real, healthy, sustainable returns. This powerful book Pinpoints dysfunctional sectors within the financial industry and offers advice against frauds and scammers Shows how a team approach to asset management can ward off financial predators Offers practical strategies and tools to combat client risk for Risk and Asset Management Offering insightful information to protect your clients from all sorts of frauds and incompetence, this essential guide equips you with tips and techniques to spot the red flags of fraud and prevent it before it starts.


Cloud Security. A Comprehensive Guide to Secure Cloud Computing Cloud Security. A Comprehensive Guide to Secure Cloud Computing

Автор: Russell Vines Dean

Год издания: 

Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches


Web Application Defender's Cookbook. Battling Hackers and Protecting Users Web Application Defender's Cookbook. Battling Hackers and Protecting Users

Автор: Jeremiah Grossman

Год издания: 

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each «recipe» shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more. Provides practical tactics for detecting web attacks and malicious behavior and defending against them Written by a preeminent authority on web application firewall technology and web application defense tactics Offers a series of «recipes» that include working code examples for the open-source ModSecurity web application firewall module Find the tools, techniques, and expert information you need to detect and respond to web application attacks with Web Application Defender's Cookbook: Battling Hackers and Protecting Users.


From the Campfire to the Holodeck. Creating Engaging and Powerful 21st Century Learning Environments From the Campfire to the Holodeck. Creating Engaging and Powerful 21st Century Learning Environments

Автор: David Thornburg

Год издания: 

How to optimize educational spaces and teaching practices for more effective learning Author David Thornburg, an award-winning futurist and educational consultant, maintains that in order to engage all students, learning institutions should offer a balance of Campfire spaces (home of the lecture), Watering Holes (home to conversations between peers), Caves (places for quiet reflection), and Life (places where students can apply what they've learned). In order to effectively use technology in the classroom, prepare students for future careers, and incorporate project-based learning, all teachers should be moving from acting as the «sage on the stage» to becoming the «guide on the side.» Whether you are a school administrator interested in redesigning your school or a teacher who wants to prepare better lessons, From the Campfire to the Holodeck can help by providing insight on how to: Boost student engagement Enable project-based learning Incorporate technology into the classroom Encourage student-led learning From the Campfire to the Holodeck is designed to help schools move from traditional lecture halls (Campfires) where students just receive information to schools that encourage immersive student-centered learning experiences (Holodecks).