Books & Videos

Table of Contents

  1. Chapter 1 A Model of Virtualization

    1. Model of Virtualization

    2. What Is Virtualization?

    3. Layers of Virtualization at Work

    4. Goals of Virtualization

  2. Chapter 2 Access Virtualization: Providing Universal Access

    1. What Is Access Virtualization?

    2. What Does Access Virtualization Do?

    3. When Is Access Virtualization the Right Choice?

    4. Players in the Access Virtualization World

    5. A Few Examples of Access Virtualization in Use

  3. Chapter 3 Application Virtualization: Application Isolation, Delivery and Performance

    1. What Is Application Virtualization?

    2. What Does Application Virtualization Do?

    3. When Is Application Virtualization a Suggested Approach?

    4. Players in the Application Virtualization World

    5. A Few Examples of Application Virtualization in Use

  4. Chapter 4 Processing Virtualization: Doing System Tricks

    1. What Is Processing Virtualization?

    2. What Does Processing Virtualization Do?

    3. When Is Processing Virtualization the Preferred Approach?

    4. Players in the Processing Virtualization World

    5. A Few Examples of Processing Virtualization in Use

  5. Chapter 5 Network Virtualization: Controlling the View of the Network

    1. What Is Network Virtualization?

    2. What Does Network Virtualization Do?

    3. When Is Network Virtualization Required?

    4. Players in the Network Virtualization World

    5. A Few Examples of Network Virtualization in Use

  6. Chapter 6 Storage Virtualization: Where Are Your Files and Applications?

    1. What Is Storage Virtualization?

    2. What Does Storage Virtualization Do?

    3. When Should Storage Virtualization Be Used?

    4. Players in the Storage Virtualization World

    5. A Few Examples of Storage Virtualization in Use

  7. Chapter 7 Security for Virtual Environments: Guarding the Treasure

    1. What Is Security for Virtual Environments?

    2. What Does Security for Virtual Environments Do?

    3. When Is Security for Virtual Environments Needed?

    4. Players in the Security for Virtual Environments World

    5. A Few Examples of Security for Virtual Environments in Use

  8. Chapter 8 Management for Virtual Environments

    1. What Is Management for Virtual Environments?

    2. What Does Management for Virtual Environments Do?

    3. When Is Management Software for Virtual Environments Needed?

    4. Players in the Management for Virtual Environments World

    5. A Few Examples of Management for Virtual Environments in Use

  9. Chapter 9 Using Virtualization: The Right Tool for the Job

    1. Highlighting When Use Cases Are Confused with Technology

    2. Big Data

    3. Clusters

    4. Desktop Virtualization

    5. High-Performance Computing

    6. Server Virtualization

    7. Extreme Transaction Processing

  10. Chapter 10 Summary

    1. Virtualization Is a Double-Edged Sword

    2. Where to Go Next

  1. Colophon