Guide to security for full virtualization technologies by Karen Kent | Lex | Lex