Premium Content

Access "Avoid security holes in the virtual data center"

This chapter is included in the "Managing advanced virtualization techniques" E-Book.
AV_ch5_Final_v6.PNG

Sponsored by SearchServerVirtualization

In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization. You'll also get advice from our experts, and learn the latest server virtualization strategies.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Access Other Available Chapters

More Premium Content Accessible For Free

  • What Is all that virtualization performance data telling us?
    VM_management_ch2.png
    E-Chapter

    Admins are gaining better insight into server and VM performance data, but what do they do with it? We are beginning to see a push for tools that can...

  • Virtualization management challenges
    vm_management_ch1.png
    E-Chapter

    Virtualization admins' top concern is no longer choosing a hypervisor -- it's choosing the right tools that will help with management, improve VM ...

  • VM management and capacity prediction
    vm_management_ch1.png
    E-Book

    As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar ...