Pro Hyper-V pp 369-396 | Cite as

Securing Your Virtual Infrastructure


In many ways, securing your virtual infrastructure is no different than securing your physical infrastructure. It uses the same security concepts, such as the principle of least privilege.


Virtual Machine Intrusion Detection System Role Assignment Virtual Infrastructure Task Definition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Harley Stagner 2009

Personalised recommendations