Related Books

Guide to Security for Full Virtualization Technologies
Language: en
Pages: 35
Authors: K. A. Scarfone
Categories:
Type: BOOK - Published: 2011 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to pro
Virtualization Security
Language: en
Pages: 360
Authors: Dave Shackleford
Categories: Computers
Type: BOOK - Published: 2012-11-08 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors Virtualization changes the playing field when it comes to security. There are new at
Official (ISC)2® Guide to the ISSAP® CBK
Language: en
Pages: 586
Authors: (ISC)2 Corporate
Categories: Computers
Type: BOOK - Published: 2017-01-06 - Publisher: CRC Press

DOWNLOAD EBOOK

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also ne
Introduction to Middleware
Language: en
Pages: 638
Authors: Letha Hughes Etzkorn
Categories: Computers
Type: BOOK - Published: 2017-06-12 - Publisher: CRC Press

DOWNLOAD EBOOK

"A stereotype of computer science textbooks is that they are dry, boring, and sometimes even intimidating. As a result, they turn students’ interests off from
Big Data Analytics in Cybersecurity
Language: en
Pages: 336
Authors: Onur Savas
Categories: Business & Economics
Type: BOOK - Published: 2017-09-18 - Publisher: CRC Press

DOWNLOAD EBOOK

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB)