A.2. Virtualization Security

Further information on virtualization security: