A step-by-step guide to identifying and defending against attacks on the virtual environmentAs more and more data is moved into virtual environments the need to secure them becomes increasingly important.€Useful for service providers as well as enterprise and small business IT professionals the book...
Full description