Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources...

Full description

Other Authors: Hoopes, John., ScienceDirect (Online service)
Format: eBook
Language: English
Published: Burlington, MA : Syngress Pub., [2009]
Physical Description: 1 online resource (xix, 357 pages) : illustrations.
Subjects:
LEADER 04694cam a2200805Ia 4500
001 370436134
003 OCoLC
005 20180526100233.2
006 m o d
007 cr cn|||||||||
008 090604s2009 maua ob 001 0 eng d
019 |a 318240439  |a 318614030  |a 463291616  |a 505132834  |a 646801211  |a 656471524  |a 804835856  |a 1033775634 
020 |a 9781597493055 
020 |a 1597493058 
020 |a 9780080879352  |q (electronic bk.) 
020 |a 0080879357  |q (electronic bk.) 
020 |a 9786612034640 
020 |a 6612034645 
024 8 |a 9786612034640 
035 |a (OCoLC)370436134  |z (OCoLC)318240439  |z (OCoLC)318614030  |z (OCoLC)463291616  |z (OCoLC)505132834  |z (OCoLC)646801211  |z (OCoLC)656471524  |z (OCoLC)804835856  |z (OCoLC)1033775634 
037 |a 161192:161371  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d LGG  |d N$T  |d CDX  |d UBY  |d IDEBK  |d E7B  |d CNCGM  |d YDXCP  |d B24X7  |d UMI  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d NLE  |d OCLCQ  |d OCLCF  |d AUD 
049 |a COM6 
050 4 |a QA76.9.V5  |b V5778 2009 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Virtualization for security :  |b including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /  |c John Hoopes, technical editor ; Aaron Bawcom [and others]. 
264 1 |a Burlington, MA :  |b Syngress Pub.,  |c [2009] 
264 4 |c ©2009. 
300 |a 1 online resource (xix, 357 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
520 |a One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. 
500 |a Includes index. 
505 0 |a An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a Elsevier  |b ScienceDirect All Books. 
650 0 |a Virtual computer systems. 
650 0 |a Virtual storage (Computer science)  |x Security measures. 
650 0 |a Database security. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 7 |a Database security.  |2 fast. 
650 7 |a Virtual computer systems.  |2 fast. 
655 4 |a Electronic books. 
700 1 |a Hoopes, John. 
710 2 |a ScienceDirect (Online service) 
776 0 8 |i Print version:  |t Virtualization for security.  |d Burlington, MA : Syngress Pub., ©2009  |z 9781597493055  |z 1597493058  |w (DLC) 2008044794  |w (OCoLC)233544013. 
907 |a .b49812415  |b multi  |c -  |d 160302  |e 230104 
998 |a cue  |a cu  |b 180626  |c m  |d z   |e -  |f eng  |g mau  |h 0  |i 2 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.netlib2 in 2016 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 180626  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Elsevier  |1 .i119619295  |u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9781597493055  |3 Elsevier  |z Click here for access