Chapter 9

Server Virtualization: Information Security Considerations

Thomas A. Johnson

Overview

Still considered an ‘emergent technology,’ virtualization has been in use since the mid-1960s (CDW 2010), and is well established in the mainframe and minicomputer world as a common way of sharing resources (ISACA 2010). The adoption of virtualization and the way the industry is currently using it is making the term popular, much like Windows, which has become a household name today. Until recently, there was no software package available, much less a ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.