A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. * Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack * Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense * Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations * Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
"Sinopsis" puede pertenecer a otra edición de este libro.
Davi Ottenheimer is president of flyingpenguin and a security/compliance consultant to VMware. He was previously responsible for security at Barclays Global Investors and at Yahoo! He also has helped secure Cisco, U.S. DoD, IBM, Intel, State Farm, and the University of California. Matthew Wallace is a solutions architect at VMware and was the founding engineer of Exodus Communications' Managed Security Services.
Defend your virtual environment from attacks
Your virtual environment might be a prime target for hackers and attackers who want to steal data or exploit your resources. This book arms you with the knowledge and tools to safeguard your virtual and cloud environments against external and internal threats. You'll gain insight into how to avoid denial of service, log and audit activity, protect virtual networks from eavesdroppers, and harden virtual servers. If your job involves protecting assets in virtual and cloud environments, this book will be invaluable to you.
Perform vulnerability assessments of your virtual environment to uncover security weaknesses
Learn how attacks in a virtual model differ from traditional computing models and how to best use technology and processes to defend yourself
Learn how attackers use and abuse APIs to manipulate and gain entry to virtual environments
Understand the risks of Software as a Service and how to get the protection you must have
Be ready for audits by ensuring that your virtual and cloud environments comply with standards and regulations such as PCI DSS and ISO 27001
Build your own low-budget virtualized test lab for hands-on evaluation of attacks and to practice prevention and response
ON THE DVD
Use the files on the DVD to follow along with the hands-on examples, or use them as the basis for your own code. Using the code and the book, you can
Conduct a "hypervisor escape", breaking out of a virtual machine into the host system
Load the included, ready-made penetration testing virtual machine which is preloaded with tools such as nmap, ettercap, the Open VAS vulnerability scanner, and more directly into your virtual environment
Test the security posture of your Xen or VMware environment using automated scripts that peek at virtual disks and copy or modify virtual machines
See the code used for hands-on exercises in the book that audit or attack virtual environments
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: Wonder Book, Frederick, MD, Estados Unidos de America
Condición: Good. Good condition. DVD included. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Nº de ref. del artículo: E01A-03579
Cantidad disponible: 1 disponibles
Librería: Better World Books: West, Reno, NV, Estados Unidos de America
Condición: Very Good. 1st Edition. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Nº de ref. del artículo: 17428338-6
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G1118155483I3N00
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G1118155483I4N00
Cantidad disponible: 1 disponibles
Librería: AwesomeBooks, Wallingford, Reino Unido
paperback. Condición: Very Good. Securing the Virtual Environment: How to Defend the Enterprise Against Attack Included DVD This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Nº de ref. del artículo: 7719-9781118155486
Cantidad disponible: 1 disponibles
Librería: Bahamut Media, Reading, Reino Unido
paperback. Condición: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Nº de ref. del artículo: 6545-9781118155486
Cantidad disponible: 1 disponibles