LEADER 01729nam 2200421Ia 450 001 9910702130103321 005 20121001142208.0 035 $a(CKB)5470000002424839 035 $a(OCoLC)811564868 035 $a(EXLCZ)995470000002424839 100 $a20121001d2011 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuide to security for full virtualization technologies$b[electronic resource] $erecommendations of the National Institute of Standards and Technology /$fKaren Scarfone, Murugiah Souppaya, Paul Hoffman 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2011] 215 $a1 online resource (35 unnumbered pages) 225 1 $aNIST special publication ;$v800-125.$aComputer security 300 $aTitle from PDF title screen (viewed Sept. 27, 2012). 300 $a"January 2011." 320 $aIncludes bibliographical references. 517 $aGuide to security for full virtualization technologies 606 $aComputer software$xComputer simulation$xStandards$zUnited States 606 $aComputer security$xStandards$zUnited States 615 0$aComputer software$xComputer simulation$xStandards 615 0$aComputer security$xStandards 700 $aKent$b Karen$g(Karen Ann)$01352442 701 $aSouppaya$b Murugiah$01352527 701 $aHoffman$b Paul$027377 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910702130103321 996 $aGuide to security for full virtualization technologies$93471573 997 $aUNINA