Cargando…

Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Hoopes, John
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn370436134
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 090604s2009 maua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d LGG  |d N$T  |d CDX  |d UBY  |d IDEBK  |d E7B  |d CNCGM  |d YDXCP  |d B24X7  |d UMI  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d NLE  |d OCLCQ  |d OCLCF  |d AUD  |d D6H  |d CEF  |d WYU  |d UAB  |d LEAUB  |d OCLCQ  |d UHL  |d VT2  |d VLY  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 318240439  |a 318614030  |a 463291616  |a 505132834  |a 646801211  |a 656471524  |a 804835856  |a 1033775634  |a 1062858471  |a 1086557674  |a 1152977371  |a 1162146119  |a 1192348663  |a 1240523830 
020 |a 9781597493055 
020 |a 1597493058 
020 |a 9780080879352  |q (electronic bk.) 
020 |a 0080879357  |q (electronic bk.) 
020 |a 9786612034640 
020 |a 6612034645 
020 |a 1282034642 
020 |a 9781282034648 
024 8 |a 9786612034640 
029 1 |a AU@  |b 000067094912 
029 1 |a CDX  |b 9833599 
029 1 |a CHBIS  |b 006041508 
029 1 |a CHNEW  |b 001009003 
029 1 |a CHVBK  |b 19962853X 
029 1 |a DEBBG  |b BV040902069 
029 1 |a DEBBG  |b BV042305267 
029 1 |a DEBSZ  |b 378295187 
029 1 |a DEBSZ  |b 38138134X 
029 1 |a DEBSZ  |b 405324561 
029 1 |a NZ1  |b 15189160 
035 |a (OCoLC)370436134  |z (OCoLC)318240439  |z (OCoLC)318614030  |z (OCoLC)463291616  |z (OCoLC)505132834  |z (OCoLC)646801211  |z (OCoLC)656471524  |z (OCoLC)804835856  |z (OCoLC)1033775634  |z (OCoLC)1062858471  |z (OCoLC)1086557674  |z (OCoLC)1152977371  |z (OCoLC)1162146119  |z (OCoLC)1192348663  |z (OCoLC)1240523830 
037 |a 161192:161371  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.V5  |b V5778 2009 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Virtualization for security :  |b including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /  |c John Hoopes, technical editor ; Aaron Bawcom [and others]. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2009. 
300 |a 1 online resource (xix, 357 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. 
500 |a Includes index. 
505 0 |a An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Virtual computer systems. 
650 0 |a Virtual storage (Computer science)  |x Security measures. 
650 0 |a Database security. 
650 6 |a Systèmes virtuels (Informatique) 
650 6 |a Ordinateurs  |x Mémoires virtuelles  |x Sécurité  |x Mesures. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Database security  |2 fast 
650 7 |a Virtual computer systems  |2 fast 
700 1 |a Hoopes, John. 
776 0 8 |i Print version:  |t Virtualization for security.  |d Burlington, MA : Syngress Pub., ©2009  |z 9781597493055  |z 1597493058  |w (DLC) 2008044794  |w (OCoLC)233544013 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597493055/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
891 |a .o10897999 
938 |a Books 24x7  |b B247  |n bks00032213 
938 |a Coutts Information Services  |b COUT  |n 9833599 
938 |a EBSCOhost  |b EBSC  |n 249333 
938 |a YBP Library Services  |b YANK  |n 2983251 
994 |a 92  |b IZTAP