In many ways, securing your virtual infrastructure is no different than securing your physical infrastructure. It uses the same security concepts, such as the principle of least privilege.
KeywordsVirtual Machine Intrusion Detection System Role Assignment Virtual Infrastructure Task Definition
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
© Harley Stagner 2009