VMware vSphere Security Cookbook.:
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Packt Publishing,
2014.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource |
ISBN: | 1322335907 9781322335902 9781782170358 1782170359 |
Internformat
MARC
LEADER | 00000cam a22000007a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn897021854 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 141128s2014 xx o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d DEBSZ |d S4S |d OCLCO |d COO |d REB |d N$T |d OCLCF |d OCLCQ |d OCLCO |d OCL |d FEM |d AGLDB |d ICA |d XFH |d MERUC |d OCLCQ |d OCLCO |d D6H |d VTS |d NLE |d UKMGB |d OCLCQ |d OCLCO |d WYU |d STF |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AJS |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLKB |d OCLCQ | ||
016 | 7 | |a 018005507 |2 Uk | |
019 | |a 968070802 |a 969051764 |a 994501777 |a 1432037795 | ||
020 | |a 1322335907 |q (electronic bk.) | ||
020 | |a 9781322335902 |q (electronic bk.) | ||
020 | |a 9781782170358 |q (electronic bk.) | ||
020 | |a 1782170359 |q (electronic bk.) | ||
020 | |z 9781782170341 | ||
020 | |z 1782170340 | ||
024 | 3 | |a 9781322335902 | |
035 | |a (OCoLC)897021854 |z (OCoLC)968070802 |z (OCoLC)969051764 |z (OCoLC)994501777 |z (OCoLC)1432037795 | ||
037 | |a 664872 |b MIL | ||
050 | 4 | |a T55.4-60.8 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.678 | |
049 | |a MAIN | ||
100 | 1 | |a Greer, Mike. | |
245 | 1 | 0 | |a VMware vSphere Security Cookbook. |
260 | |b Packt Publishing, |c 2014. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Print version record. | |
520 | 8 | |a Annotation |b This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly. | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client. | |
505 | 8 | |a Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions. | |
505 | 8 | |a Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter. | |
505 | 8 | |a Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes. | |
505 | 8 | |a Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5. | |
546 | |a English. | ||
630 | 0 | 0 | |a VMware vSphere. |0 http://id.loc.gov/authorities/names/n2009027888 |
630 | 0 | 7 | |a VMware vSphere |2 fast |
650 | 0 | |a Virtual computer systems. |0 http://id.loc.gov/authorities/subjects/sh85143804 | |
650 | 6 | |a Systèmes virtuels (Informatique) | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Virtual computer systems |2 fast | |
776 | 0 | 8 | |i Print version: |a Greer, Mike. |t VMware vSphere security cookbook : over 75 practical recipes to help you successfully secure your vSphere environment. |d Birmingham, England : Packt Publishing, ©2014 |h iv, 318 pages |z 9781782170341 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=910962 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH27247269 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1870667 | ||
938 | |a EBSCOhost |b EBSC |n 910962 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis30189648 | ||
938 | |b OCKB |z perlego.catalogue,8fee4f54-7c90-4b5f-86c1-c516f6aa75f4-emi | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn897021854 |
---|---|
_version_ | 1816882295497293824 |
adam_text | |
any_adam_object | |
author | Greer, Mike |
author_facet | Greer, Mike |
author_role | |
author_sort | Greer, Mike |
author_variant | m g mg |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T55 |
callnumber-raw | T55.4-60.8 |
callnumber-search | T55.4-60.8 |
callnumber-sort | T 255.4 260.8 |
callnumber-subject | T - General Technology |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client. Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions. Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter. Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes. Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5. |
ctrlnum | (OCoLC)897021854 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06296cam a22008057a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn897021854</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">141128s2014 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">S4S</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">REB</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">FEM</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">XFH</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">NLE</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AJS</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLKB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018005507</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">968070802</subfield><subfield code="a">969051764</subfield><subfield code="a">994501777</subfield><subfield code="a">1432037795</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1322335907</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781322335902</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782170358</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782170359</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781782170341</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1782170340</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781322335902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897021854</subfield><subfield code="z">(OCoLC)968070802</subfield><subfield code="z">(OCoLC)969051764</subfield><subfield code="z">(OCoLC)994501777</subfield><subfield code="z">(OCoLC)1432037795</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">664872</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T55.4-60.8</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.678</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Greer, Mike.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VMware vSphere Security Cookbook.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Packt Publishing,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">VMware vSphere.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009027888</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">VMware vSphere</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Virtual computer systems.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85143804</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes virtuels (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Virtual computer systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Greer, Mike.</subfield><subfield code="t">VMware vSphere security cookbook : over 75 practical recipes to help you successfully secure your vSphere environment.</subfield><subfield code="d">Birmingham, England : Packt Publishing, ©2014</subfield><subfield code="h">iv, 318 pages</subfield><subfield code="z">9781782170341</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=910962</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH27247269</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1870667</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">910962</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis30189648</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="b">OCKB</subfield><subfield code="z">perlego.catalogue,8fee4f54-7c90-4b5f-86c1-c516f6aa75f4-emi</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn897021854 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:21Z |
institution | BVB |
isbn | 1322335907 9781322335902 9781782170358 1782170359 |
language | English |
oclc_num | 897021854 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Greer, Mike. VMware vSphere Security Cookbook. Packt Publishing, 2014. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Print version record. Annotation This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client. Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions. Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter. Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes. Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5. English. VMware vSphere. http://id.loc.gov/authorities/names/n2009027888 VMware vSphere fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Systèmes virtuels (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Virtual computer systems fast Print version: Greer, Mike. VMware vSphere security cookbook : over 75 practical recipes to help you successfully secure your vSphere environment. Birmingham, England : Packt Publishing, ©2014 iv, 318 pages 9781782170341 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=910962 Volltext |
spellingShingle | Greer, Mike VMware vSphere Security Cookbook. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client. Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions. Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter. Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes. Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5. VMware vSphere. http://id.loc.gov/authorities/names/n2009027888 VMware vSphere fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Systèmes virtuels (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Virtual computer systems fast |
subject_GND | http://id.loc.gov/authorities/names/n2009027888 http://id.loc.gov/authorities/subjects/sh85143804 |
title | VMware vSphere Security Cookbook. |
title_auth | VMware vSphere Security Cookbook. |
title_exact_search | VMware vSphere Security Cookbook. |
title_full | VMware vSphere Security Cookbook. |
title_fullStr | VMware vSphere Security Cookbook. |
title_full_unstemmed | VMware vSphere Security Cookbook. |
title_short | VMware vSphere Security Cookbook. |
title_sort | vmware vsphere security cookbook |
topic | VMware vSphere. http://id.loc.gov/authorities/names/n2009027888 VMware vSphere fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Systèmes virtuels (Informatique) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Virtual computer systems fast |
topic_facet | VMware vSphere. VMware vSphere Virtual computer systems. Systèmes virtuels (Informatique) COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Virtual computer systems |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=910962 |
work_keys_str_mv | AT greermike vmwarevspheresecuritycookbook |