Virtualization

( 2 )

Overview

What exactly is virtualization? As this concise book explains, virtualization is a smorgasbord of technologies that offer organizations many advantages, whether you're managing extremely large stores of rapidly changing data, scaling out an application, or harnessing huge amounts of computational power. With this guide, you get an overview of the five main types of virtualization technology, along with information on security, management, and ...

See more details below
Other sellers (Paperback)
  • All (14) from $8.84   
  • New (9) from $10.53   
  • Used (5) from $8.84   
Virtualization: A Manager's Guide

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.99
BN.com price
(Save 15%)$12.99 List Price

Overview

What exactly is virtualization? As this concise book explains, virtualization is a smorgasbord of technologies that offer organizations many advantages, whether you're managing extremely large stores of rapidly changing data, scaling out an application, or harnessing huge amounts of computational power. With this guide, you get an overview of the five main types of virtualization technology, along with information on security, management, and modern use cases.

Topics include:

  • Access virtualization—Allows access to any application from any device
  • Application virtualization—Enables applications to run on many different operating systems and hardware platforms
  • Processing virtualization—Makes one system seem like many, or many seem like one
  • Network virtualization—Presents an artificial view of the network that differs from the physical reality
  • Storage virtualization—Allows many systems to share the same storage devices, enables concealing the location of storage systems, and more
Read More Show Less

Product Details

  • ISBN-13: 9781449306458
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 7/5/2011
  • Edition number: 1
  • Pages: 74
  • Product dimensions: 6.90 (w) x 9.00 (h) x 0.30 (d)

Meet the Author

Daniel Kusnetzky, Distinguished Analyst and Founder of the Kusnetzky Group LLC, has been involved with information technology since the late 1970s. He's interested in system software, virtualization technology, cloud computing, and mobility.

Read More Show Less

Table of Contents

Preface;
About This Book;
Conventions Used in This Book;
Using Code Examples;
Safari® Books Online;
How to Contact Us;
Chapter 1: A Model of Virtualization;
1.1 Model of Virtualization;
1.2 What Is Virtualization?;
1.3 Layers of Virtualization at Work;
1.4 Goals of Virtualization;
Chapter 2: Access Virtualization: Providing Universal Access;
2.1 What Is Access Virtualization?;
2.2 What Does Access Virtualization Do?;
2.3 When Is Access Virtualization the Right Choice?;
2.4 Players in the Access Virtualization World;
2.5 A Few Examples of Access Virtualization in Use;
Chapter 3: Application Virtualization: Application Isolation, Delivery and Performance;
3.1 What Is Application Virtualization?;
3.2 What Does Application Virtualization Do?;
3.3 When Is Application Virtualization a Suggested Approach?;
3.4 Players in the Application Virtualization World;
3.5 A Few Examples of Application Virtualization in Use;
Chapter 4: Processing Virtualization: Doing System Tricks;
4.1 What Is Processing Virtualization?;
4.2 What Does Processing Virtualization Do?;
4.3 When Is Processing Virtualization the Preferred Approach?;
4.4 Players in the Processing Virtualization World;
4.5 A Few Examples of Processing Virtualization in Use;
Chapter 5: Network Virtualization: Controlling the View of the Network;
5.1 What Is Network Virtualization?;
5.2 What Does Network Virtualization Do?;
5.3 When Is Network Virtualization Required?;
5.4 Players in the Network Virtualization World;
5.5 A Few Examples of Network Virtualization in Use;
Chapter 6: Storage Virtualization: Where Are Your Files and Applications?;
6.1 What Is Storage Virtualization?;
6.2 What Does Storage Virtualization Do?;
6.3 When Should Storage Virtualization Be Used?;
6.4 Players in the Storage Virtualization World;
6.5 A Few Examples of Storage Virtualization in Use;
Chapter 7: Security for Virtual Environments: Guarding the Treasure;
7.1 What Is Security for Virtual Environments?;
7.2 What Does Security for Virtual Environments Do?;
7.3 When Is Security for Virtual Environments Needed?;
7.4 Players in the Security for Virtual Environments World;
7.5 A Few Examples of Security for Virtual Environments in Use;
Chapter 8: Management for Virtual Environments;
8.1 What Is Management for Virtual Environments?;
8.2 What Does Management for Virtual Environments Do?;
8.3 When Is Management Software for Virtual Environments Needed?;
8.4 Players in the Management for Virtual Environments World;
8.5 A Few Examples of Management for Virtual Environments in Use;
Chapter 9: Using Virtualization: The Right Tool for the Job;
9.1 Highlighting When Use Cases Are Confused with Technology;
9.2 Big Data;
9.3 Clusters;
9.4 Desktop Virtualization;
9.5 High-Performance Computing;
9.6 Server Virtualization;
9.7 Extreme Transaction Processing;
Chapter 10: Summary;
10.1 Virtualization Is a Double-Edged Sword;
10.2 Where to Go Next;
Colophon;

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted December 15, 2012

    Out Character

    Means made up

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 15, 2012

    Tyce

    OC?

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)