O'Reilly logo

Virtualization Security: Protecting Virtualized Environments by Dave Shackleford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Advanced Virtual Network Operations

There are a number of operations, tasks, and technologies related to security that administrators and engineers working with virtualization environments need to be familiar with. Of the three fundamental tenets of information security—confidentiality, integrity, and availability—most security professionals focus on confidentiality and integrity, whereas operations teams focus on availability first and integrity second. Many network operations within the virtual environment are concerned primarily with availability and continuous network connectivity. In this chapter, we'll dive into several additional aspects of network operations that impact security and compliance.

In this chapter, you will learn ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required