Micro-segmentation For Dummies [VMware edition]
文件大小: 5295k
源码售价: 10 个金币 积分规则     积分充值
资源说明:Title: Micro-segmentation For Dummies [VMware edition] Author(s): Lawrence Miller; Joshua Soto Series: For Dummies Publisher: John Wiley & Sons City: Hoboken, NJ Year: 2015 Language: English Pages (biblio\tech): 77\77 ISBN: 9781119177340 9781119177357 This book provides a broad overview of micro-segmentation in the data center. After reading this book, you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)! Table of contents : Title Page......Page 3 Copyright Page......Page 4 Table of Contents......Page 5 Introduction......Page 7 Foolish Assumptions......Page 8 Where to Go from Here......Page 9 Data Breaches Continue to Occur......Page 11 The Lifecycle of a Data Center Attack......Page 12 Throwing Stones at the (Data Center) Perimeter Walls......Page 15 Limiting Lateral Movement within the Data Center......Page 21 Visibility and context......Page 23 Isolation......Page 24 Segmentation......Page 26 Automation......Page 27 Persistence......Page 29 Extensibility......Page 30 Balancing Context and Isolation......Page 31 Implementing Least Privilege and Unit-Level Trust with Micro-segmentation......Page 32 What Micro-segmentation Is Not......Page 33 Key Forces Driving the Need for Data Center Transformation......Page 37 Transforming Your Data Center with Network Virtualization......Page 40 How Network Virtualization Works......Page 42 Essential Elements for Network Virtualization......Page 45 Just planes — no trains or automobiles......Page 46 Encapsulation......Page 47 Creating Security Policies for the Software‐Defined Data Center......Page 51 Network‐based policies......Page 52 Application‐based policies......Page 53 Adapting to Change......Page 54 Responding to Threats......Page 55 Firewalling Tens of Thousands of Workloads with a Single Logical Firewall......Page 57 Achieving Micro‐segmentation......Page 59 Identify patterns and relationships......Page 61 Security Use Cases......Page 62 Network security inside the data center......Page 63 Secure user environments......Page 64 Minimize Risk and Impact of Data Center Security Breaches......Page 67 Automate IT Service Delivery and Speed Time to Market......Page 68 Enable Advanced Security Service Insertion, Chaining, and Traffic Steering......Page 69 Leverage Existing Infrastructure......Page 70 Lower Operating Expenses......Page 72 Securely Enable Business Agility......Page 73 EULA......Page 77
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。