| http://www.w3.org/ns/prov#value | - Before delving into virtualization security, let???s start out by taking a look at the hypervisor, which is used by virtualization platforms such as VMware ESX and Microsoft???s Hyper-V. There are a lot of myths surrounding the ability to exploit the hypervisor.
|