Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources...
Other Authors: | Hoopes, John., ScienceDirect (Online service) |
---|---|
Format: | eBook |
Language: | English |
Published: |
Burlington, MA :
Syngress Pub.,
[2009]
|
Physical Description: |
1 online resource (xix, 357 pages) : illustrations. |
Subjects: |
Summary: |
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. |
---|---|
Item Description: |
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. Includes index. An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training. Includes bibliographical references and index. Elsevier ScienceDirect All Books. |
Physical Description: |
1 online resource (xix, 357 pages) : illustrations. |
Bibliography: |
Includes bibliographical references and index. |
ISBN: |
9781597493055 1597493058 9780080879352 0080879357 9786612034640 6612034645 |