.
Virtual Revolution. Server virtualization can save time, space andperhaps most importantmoney. Experts and IT executives offer their insights and experience on the technology thats changing the data center. (CIO decisions) 2009 3091 25
Is your data center ready for virtualization?. 2009 510 9  
Best Practices to Protect Your Virtual Environment 2010 556 5  
Virtualization Moves from the Back Office to the Front Office. Bob ODonnell. 2008 237 8  
Virtualization for Disaster Recovery. 2009 1102 13  
Virtualization 2.0: Driving To Higher Ground Beyond The Basics. 2010 1131 19  
How Virtual Infrastuctures Change Security. Introduction to Virtualization E-book 2009 1716 13  
Lets Get Virtual: A Look at Todays Server Virtualization Architectures. Chris Wolf May 14, 2007 647 52  
Virtualization Defined - Eight Different Ways 2010 56 3  
Protecting Mission-Critical, Multi-Tier Business Applications with Neverfail and Virtualization July 2010 608 12  
Virtualization Strategies for 2011 2011 513 3  
Increase Utilization, Decrease Energy Costs With Data Center Virtualization 2008 2437 23  
Solving the Top Six Enterprise Storage Issues. Learn How to Meet the Challenges of Rapid Data Growth with Storage Virtualization (Hitachi) December 2007 650 21  
Security Virtualization: Re-architecting the Appliance Mentality 2008 2271 15  
The Green and Virtual Data Center 2009 508 30  
Executive Brief on VMware Backup and Recovery: Challenges and Solutions 2011 873 10  
Virtualization Security 2009 858 27  
Virtualization Security. A coordinative Approach for Intrusion Detection and Prevention 2008 898 2  
Securing Virtualized Datacenters 2009 1127 19  
Virtualization Overview 2009 1133 10  
Server Virtualization for Dummies 2012 4116 67  
Virtual Data Center 2010 2796 21  
Virtualization Data Protection Report 2011 2012 583 12  
Virtualization and the Case for Universal Grid Architectures November 2012 1572 16 By Steve Duplessie (*)
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities 2013 1018 6 by Marco Krebs and William Rothwell
The Essential Guide to Microsoft Virtualization November 2010 4673 6 by Mel Beckman