Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Virtualization for securityincluding...
~
Hoopes, John.
Virtualization for securityincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Virtualization for securityJohn Hoopes, technical editor ; Aaron Bawcom ... [et al.].
Reminder of title:
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
other author:
Hoopes, John.
Published:
Burlington, MA :Syngress Pub.,c2009.
Description:
xix, 357 p. :ill. ;24 cm.
Notes:
Includes index.
Subject:
Virtual computer systems.
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
ISBN:
9781597493055
Virtualization for securityincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Virtualization for security
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /[electronic resource] :John Hoopes, technical editor ; Aaron Bawcom ... [et al.]. - Burlington, MA :Syngress Pub.,c2009. - xix, 357 p. :ill. ;24 cm.
Includes index.
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2009.
Mode of access: World Wide Web.
ISBN: 9781597493055
Source: 161192:161371Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
242511
Virtual computer systems.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.V5 / V5778 2009
Dewey Class. No.: 005.8
Virtualization for securityincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
LDR
:02858cmm 2200337Ia 4500
001
257295
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
100818s2009 maua o 001 0 eng d
020
$a
9781597493055
020
$a
1597493058
035
$a
(OCoLC)370436134
035
$a
ocn370436134
037
$a
161192:161371
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.V5
$b
V5778 2009
082
0 4
$a
005.8
$2
22
245
0 0
$a
Virtualization for security
$h
[electronic resource] :
$b
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
$c
John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
260
$a
Burlington, MA :
$b
Syngress Pub.,
$c
c2009.
300
$a
xix, 357 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
520
$a
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2009.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on June 3, 2009).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Virtual computer systems.
$3
242511
650
0
$a
Virtual storage (Computer science)
$x
Security measures.
$3
455403
650
0
$a
Database security.
$3
214959
655
7
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Hoopes, John.
$3
455402
710
2
$a
ScienceDirect (Online service)
$3
307425
776
1
$c
Original
$z
9781597493055
$z
1597493058
$w
(DLC) 2008044794
$w
(OCoLC)233544013
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000040390
電子館藏
1圖書
電子書
EB QA76.9.V5 V5778 2009
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597493055
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login