Member Learning Catalog  

 Safari Books Online Catalog

As a benefit of membership in IEEE Computer Society, you have access to 600 titles from Safari® Books Online, featuring technical and business titles from top publishers such as O'Reilly Media.

To ensure members have access to the newest information, the selections are reviewed every few months and books are added or deleted based upon their usage. Below you will find the list of all titles currently in the collection, including new titles and those deleted on 31 October 2012.

Books added to the Computer Society collection
Books deleted from the Computer Society collection

Membership Communication: Questions, need help? Contact Customer Service


 Access Safari


Available FREE to Computer Society Members!

Available at a 20% discount to Computer Society Members. Learn more or Subscribe.

Safari® Books Online
Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere. This book reflects the same hands-on approach that made Haletky’s VMware ESX Server in the Enterprise so popular with working professionals. Haletky doesn’t just reveal where you might be vulnerable; he tells you exactly what to do and how to reconfigure your infrastructure to address the problem. VMware vSphere and Virtual Infrastructure Security begins by reviewing basic server vulnerabilities and explaining how security differs on VMware virtual servers and related products. Next, Haletky drills deep into the key components of a VMware installation, identifying both real and theoretical exploits, and introducing effective countermeasures. Coverage includes •    Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce •    Discovering which security threats the vmkernel does (and doesn’t) address •    Learning how VMsafe enables third-party security tools to access the vmkernel API •    Understanding the security implications of VMI, paravirtualization, and VMware Tools •    Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more •    Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion •    Securing the deployment and management of virtual machines across the network •    Mitigating risks associated with backup, performance management, and other day-to-day operations •    Using multiple security zones and other advanced virtual network techniques •    Securing Virtual Desktop Infrastructure (VDI) •    Auditing virtual infrastructure, and conducting forensic investigations after a possible breach   |
VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment
Edward L. Haletky
Prentice Hall
Publication Date:
Number of pages:


"Logic will get you from A to B. Imagination will take you everywhere."
- Albert Einstein