This article is a mirror article of machine translation, please click here to jump to the original article.

View: 80304|Reply: 7

[e-book] Cloud Virtualization Security Attack and Defense Practice (Tang Qinghao et al.) pdf

[Copy link]
Posted on 8/1/2019 8:27:16 AM | | | |

Cloud Virtualization Security Attack and Defense Practice (Tang Qinghao et al.) pdf
The cloud computing market has reached the order of 100 billion US dollars, and the form of cloud computing has been continuously enriched, occupying an important position in the current and future layout of enterprises and governments.
As a key part of the cloud ecosystem, hypervisors give humans more granular control over computer hardware resources.
Mainstream hypervisor products such as KVM, Xen, Docker, etc. have dominated the existing public and private cloud markets.

Chapter 1 Understanding Hypervisors 1
Chapter 2 Docker Container Security 19
Chapter 3 VMware Workstation Security 83
Chapter 4 QEMU and KVM Security 136
Chapter 5 Xen Security 183
Chapter 6 Hyper-V Security 209
Chapter 7 Hypervisor Vulnerability Prevention Techniques 267

https://pan.baidu.com/s/1FaUTgY5LOjX8FbHQumSILQ
Tourists, if you want to see the hidden content of this post, pleaseReply






Previous:92nd Anniversary Selected Material Pack (including poster PSD, keyless PNG)
Next:Resource Tuner 2.20 Chinese registration version
Posted on 8/1/2019 8:49:27 AM |
hypervisor
Posted on 8/1/2019 2:02:26 PM |
Thanks for sharing!
Posted on 4/4/2020 10:50:28 AM |

Thanks for sharing!
Posted on 7/10/2020 12:35:16 PM |
Thanks for sharing!
Posted on 1/26/2021 9:41:11 AM |
Thank you for sharing, thank you, landlord.
Posted on 7/14/2021 8:40:29 AM |
Can you still download it?
Posted on 7/24/2021 8:41:55 PM |
Thanks for sharing. Study hard
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com