Chapter 7. Securing Proxmox VE
"Abstraction may be discovered or produced, may be material or immaterial, but abstraction is what every hack produces and affirms....To hack is to produce or apply the abstract to information and the possibility of new worlds" | ||
-- A Hacker Manifesto, McKenzie Wark |
"Putting it bluntly, virtualization is deception." | ||
-- Data Center Virtualization Essentials, Gustavo Alessandro Andrade Santana |
"The enemy knows the system being used..." | ||
-- Shannon's Maxim |
"Security through obscurity is not an answer." | ||
-- Information Security: Principles and Practices, Merkow and Breithaupt |
"Containers have quickly become a popular cloud-optimization strategy for enterprises, however, what do we really know about the security ... |
Get Learning Proxmox VE now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.