Skip to Content
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
book

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

by Davi Ottenheimer, Matthew Wallace
May 2012
Intermediate to advanced
456 pages
12h 6m
English
Wiley
Content preview from Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Wiley Publishing, Inc.End-User License Agreement

READ THIS. You should carefully read these terms and conditions before opening the software packet(s) included with this book “Book”. This is a license agreement “Agreement” between you and Wiley Publishing, Inc. “WPI”. By opening the accompanying software packet(s), you acknowledge that you have read and accept the following terms and conditions. If you do not agree and do not want to be bound by such terms and conditions, promptly return the Book and the unopened software packet(s) to the place you obtained them for a full refund.

1. License Grant. WPI grants to you (either an individual or entity) a nonexclusive license to use one copy of the enclosed software program(s) (collectively, the “Software,” solely for your own personal or business purposes on a single computer (whether a standard computer or a workstation component of a multi-user network). The Software is in use on a computer when it is loaded into temporary memory (RAM) or installed into permanent memory (hard disk, CD-ROM, or other storage device). WPI reserves all rights not expressly granted herein.
2. Ownership. WPI is the owner of all right, title, and interest, including copyright, in and to the compilation of the Software recorded on the physical packet included with this Book “Software Media”. Copyright to the individual programs recorded on the Software Media is owned by the author or other authorized copyright owner of each program. Ownership of the Software ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Mike Harwood
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes

Publisher Resources

ISBN: 9781118239261Purchase book