Virtualización

Panorama

Imagen tomada de:
National Instruments

La virtualización es un medio para crear una versión virtual de un dispositivo o recurso, tales como: un servidor, un dispositivo de almacenamiento, una red o incluso un sistema operativo en una máquina física, generalmente con el apoyo de un software que implementa una capa de abstracción para que la maquina física y la virtual puedan comunicarse y compartir recursos.

La reducción de precios en el hardware y la variedad de software para virtualización cada vez más asequibles ha democratizado esta tecnología que, bien utilizada, puede poner a nuestra disposición más opciones de sistemas operativos, costes menores y un mayor control sobe nuestra estructura.

Publicaciones

    Inglés

    1. An empirical study into the security exposure to hosts of hostile virtualized environments
    2. Architecting the Security of the Next-Generation Data Center
    3. Cloud security is not (just) virtualization security: a short paper
    4. CyberGuarder: A virtualization security assurance architecture for green cloud computing
    5. Desktop Virtualization with Dell and Citrix: Solving the Desktop Lifecycle Management Challenge
    6. E-Guide: An Expert Guide to Desktop Virtualization Implementation
    7. E-Guide: Desktop Virtualization - Expert Guide to VDI, Hypervisors, and More
    8. Enhancing Grid Security Using Trusted Virtualization
    9. Hosted virtualization hypervisors and use cases: The complete guide
    10. How virtual security appliances and tools protect a data center
    11. Lares: An Architecture for Secure Active Monitoring Using Virtualization
    12. Network virtualization: state of the art and research challenges
    13. Red Hat Enterprise Virtualization: Overview of RHEV-M, RHEV-H and RHEL
    14. The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes
    15. The role of virtualization in embedded systems
    16. The security benefits and risks of virtualization
    17. The usability of electronic voting machines and how votes can be changed without detection
    18. Virtualization and Hardware-Based Security
    19. Virtualization as an enabler for security in mobile devices
    20. Virtualization for high-performance computing
    21. Virtualization security
    22. Virtualization Sparks Security Concerns
    23. Virtualization: a key feature of cloud computing

    Video

      Español

      1. Virtual Remote Desktop Overview