Sorry for the title, although it’s kind of realistic to keep yourself up2date with the latest in the “V” Technology.
So, if you’re still conservative about Twitter and think that it’s the next evil force on the humanity, or haven’t got the time yet to subscribe to the 123,456 online virtualization blogs (and counting), you may have missed one or two of the announcements lately about these great books. I’m putting them all in one shot, with additional links for getting more information about them:
VMware vSphere and Virtual Infrastructure Security: Securing the Virtual Environment
|This book is talking about one of the most important and least talked about topics in the virtualization industry: “Security!”. The great thing about the book also is that it is going to cover the VI3 as well as the vSphere, so you won’t be missing anything from both platforms.
Author: Edward L. Haletky
Managing VMware Infrastructure with Windows PowerShell
|PowerShell is becoming the universal scripting language now, and gaining more adoption from all kind of vendors and applications. This book is covering the VI3 management with PS.|
Mastering VMware vSphere 4
|The much-awaited vSphere 4 platform from VMware has a detailed book from Scott Lowe available now for pre-order. Scott has a great blog online here , and also Chad Sakac is writing the Storage chapter in this book, which is another reason for me to must-have this book.
Author: Scott Lowe
Information Storage and Management: Storing, Managing, and Protecting Digital Information
|Storage is a vital and indispensible part in any virtual environment. This new book from EMC explores deferent storage areas, starting from basic SAN technologies all the way to advanced topics like replication and storage virtualization.
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
| Another very interesting book about security and virtualization, covering all sorts of subjects like: Sandboxing, Honeypotting, Maleware analysis, Application testing, and last but not least Forensic analysis. It’s a must have book for anyone interested in security and how the virtualization can be leveraged in that.