1:EVOLUTION TO VSPHERE 6.7 2:DESIGNING AND PLANNING A VIRTUALIZATION INFRASTRUCTURE 3:ANALYSIS AND ASSESSMENT OF EXISTING ENVIRONMENTS 4:DEPLOYMENT WORKFLOW AND COMPONENT INSTALLATION 5:CONFIGURING AND MANAGING VSPHERE 6.7 6:LIFE CYCLE MANAGEMENT, PATCHING, AND UPGRADING 7:MANAGING NETWORKING RESOURCES 8:MANAGING STORAGE RESOURCES 9:VM DEPLOYMENT AND MANAGEMENT 10:VM RESOURCE MANAGEMENT 11:AVAILABILITY AND DISASTER RECOVERY 12:SECURING AND PROTECTING YOUR ENVIRONMENT 13:ANALYZING AND OPTIMIZING YOUR ENVIRONMENT 14:TROUBLESHOOTING YOUR ENVIRONMENT 15:BUILDING YOUR OWN VMWARE VSPHERE LAB
文件格式: PDF大小: 89.6MB页数: 740
《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer
文件格式: PDF大小: 378.2KB页数: 18
《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization
文件格式: PDF大小: 623.98KB页数: 5
Chapter 1:The Virtual Data Center Chapter 2:The Discovery Process Chapter 3:The Design Factors Chapter 4:vSphere Management Design Chapter 5:vVSphere Storage Design Chapter 6:vVSphere Network Design Chapter 7:vSphere Compute Design Chapter 8:vSphere Physical Design Chapter 9:Virtual Machine Design Chapter 10:Deployment Workflow and Component Installation Chapter 11:Configuring and Managing vSphere 6.7 Chapter 12:Life Cycle Management, Patching, and Upgrading Chapter 13:VM Deployment and Management Chapter 14:VM Resource Management Chapter 15:Availability and Disaster Recovery Chapter 16:Securing and Protecting Your Environment Chapter 17:Analyzing and Optimizing Your Environment Chapter 18:Troubleshooting Your Environment Chapter 19:Building Your Own VMware vSphere Lab
文件格式: PDF大小: 75.04MB页数: 754
河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲)
文件格式: PDF大小: 283.43KB页数: 8
河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲)
文件格式: PDF大小: 367.41KB页数: 13
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文件格式: PDF大小: 1.23MB页数: 26
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文件格式: PDF大小: 231.3KB页数: 12
• Attacks against browsers • Fake and malicious websites • Attacks targeting sensitive data • Injection attacks • Spam • Phishing attacks
文件格式: PDF大小: 1.14MB页数: 24
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文件格式: PDF大小: 168.09KB页数: 15
©2025 mall.hezhiquan.com 和泉文库
帮助反馈侵权