1. Virtual machines and administration
1.1 Principle and usage
Moving data from one location to another on the network is easy to understand. But server mobility through virtualization deserves some clarification. Since cloud computing relies entirely on server virtualization techniques, which completely determine the security considerations that apply to it, a sufficiently comprehensive overview should be provided here.
To run application software (financial management, web server, etc.), you need disk space to store data and results, and a computer to calculate the results from the data. In fact, most of the time, you also need an operating system, which is software designed to act as an intermediary between the user (or their application software) and the computer, because if each piece of software...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Virtual machines and administration
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!