Language:
English
繁體中文
Help
回圖書館
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Virtualization for security = includ...
~
ScienceDirect (Online service)
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Virtualization for security/ John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
Reminder of title:
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
other author:
Hoopes, John.
Published:
Burlington, MA :Syngress Pub., : c2009.,
Description:
xix, 357 p. :ill. ; : 24 cm.;
Notes:
Includes index.
Subject:
Virtual computer systems. -
Online resource:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597493055
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Virtualization for security
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /[electronic resource] :John Hoopes, technical editor ; Aaron Bawcom ... [et al.]. - Burlington, MA :Syngress Pub.,c2009. - xix, 357 p. :ill. ;24 cm.
Includes index.
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2009.
Mode of access: World Wide Web.
ISBN: 9781597493055
Source: 161192:161371Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
201295
Virtual computer systems.
Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.9.V5 / V5778 2009
Dewey Class. No.: 005.8
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
LDR
:02858cmm 2200337Ia 4500
001
153667
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2009 maua o 001 0 eng d
020
$a
9781597493055
020
$a
1597493058
035
$a
(OCoLC)370436134
035
$a
ocn370436134
037
$a
161192:161371
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.V5
$b
V5778 2009
082
0 4
$a
005.8
$2
22
245
0 0
$a
Virtualization for security
$h
[electronic resource] :
$b
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
$c
John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
260
$a
Burlington, MA :
$c
c2009.
$b
Syngress Pub.,
300
$a
xix, 357 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
520
$a
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2009.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on June 3, 2009).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Virtual computer systems.
$3
201295
650
0
$a
Virtual storage (Computer science)
$x
Security measures.
$3
292535
650
0
$a
Database security.
$3
122255
655
7
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Hoopes, John.
$3
292534
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
9781597493055
$z
1597493058
$w
(DLC) 2008044794
$w
(OCoLC)233544013
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login