01729nam 2200421Ia 450 991070213010332120121001142208.0(CKB)5470000002424839(OCoLC)811564868(EXLCZ)99547000000242483920121001d2011 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierGuide to security for full virtualization technologies[electronic resource] recommendations of the National Institute of Standards and Technology /Karen Scarfone, Murugiah Souppaya, Paul HoffmanGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,[2011]1 online resource (35 unnumbered pages)NIST special publication ;800-125.Computer securityTitle from PDF title screen (viewed Sept. 27, 2012)."January 2011."Includes bibliographical references.Guide to security for full virtualization technologies Computer softwareComputer simulationStandardsUnited StatesComputer securityStandardsUnited StatesComputer softwareComputer simulationStandardsComputer securityStandardsKent Karen(Karen Ann)1352442Souppaya Murugiah1352527Hoffman Paul27377National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910702130103321Guide to security for full virtualization technologies3471573UNINA