語系:
繁體中文
English
說明(常見問題)
回圖書館
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Virtualization for security = includ...
~
ScienceDirect (Online service)
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Virtualization for security/ John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
其他題名:
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
其他作者:
Hoopes, John.
出版者:
Burlington, MA :Syngress Pub., : c2009.,
面頁冊數:
xix, 357 p. :ill. ; : 24 cm.;
附註:
Includes index.
標題:
Virtual computer systems. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597493055
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Virtualization for security
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /[electronic resource] :John Hoopes, technical editor ; Aaron Bawcom ... [et al.]. - Burlington, MA :Syngress Pub.,c2009. - xix, 357 p. :ill. ;24 cm.
Includes index.
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2009.
Mode of access: World Wide Web.
ISBN: 9781597493055
Source: 161192:161371Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
201295
Virtual computer systems.
Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.9.V5 / V5778 2009
Dewey Class. No.: 005.8
Virtualization for security = including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
LDR
:02858cmm 2200337Ia 4500
001
153667
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2009 maua o 001 0 eng d
020
$a
9781597493055
020
$a
1597493058
035
$a
(OCoLC)370436134
035
$a
ocn370436134
037
$a
161192:161371
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.V5
$b
V5778 2009
082
0 4
$a
005.8
$2
22
245
0 0
$a
Virtualization for security
$h
[electronic resource] :
$b
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
$c
John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
260
$a
Burlington, MA :
$c
c2009.
$b
Syngress Pub.,
300
$a
xix, 357 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
520
$a
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2009.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on June 3, 2009).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Virtual computer systems.
$3
201295
650
0
$a
Virtual storage (Computer science)
$x
Security measures.
$3
292535
650
0
$a
Database security.
$3
122255
655
7
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Hoopes, John.
$3
292534
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
9781597493055
$z
1597493058
$w
(DLC) 2008044794
$w
(OCoLC)233544013
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入