Guide to Security for Full Virtualization Technologies