|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn370436134 |
003 |
OCoLC |
005 |
20231117015311.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
090604s2009 maua ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OPELS
|d OCLCQ
|d LGG
|d N$T
|d CDX
|d UBY
|d IDEBK
|d E7B
|d CNCGM
|d YDXCP
|d B24X7
|d UMI
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d COO
|d LIV
|d OCLCQ
|d NLE
|d OCLCQ
|d OCLCF
|d AUD
|d D6H
|d CEF
|d WYU
|d UAB
|d LEAUB
|d OCLCQ
|d UHL
|d VT2
|d VLY
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 318240439
|a 318614030
|a 463291616
|a 505132834
|a 646801211
|a 656471524
|a 804835856
|a 1033775634
|a 1062858471
|a 1086557674
|a 1152977371
|a 1162146119
|a 1192348663
|a 1240523830
|
020 |
|
|
|a 9781597493055
|
020 |
|
|
|a 1597493058
|
020 |
|
|
|a 9780080879352
|q (electronic bk.)
|
020 |
|
|
|a 0080879357
|q (electronic bk.)
|
020 |
|
|
|a 9786612034640
|
020 |
|
|
|a 6612034645
|
020 |
|
|
|a 1282034642
|
020 |
|
|
|a 9781282034648
|
024 |
8 |
|
|a 9786612034640
|
035 |
|
|
|a (OCoLC)370436134
|z (OCoLC)318240439
|z (OCoLC)318614030
|z (OCoLC)463291616
|z (OCoLC)505132834
|z (OCoLC)646801211
|z (OCoLC)656471524
|z (OCoLC)804835856
|z (OCoLC)1033775634
|z (OCoLC)1062858471
|z (OCoLC)1086557674
|z (OCoLC)1152977371
|z (OCoLC)1162146119
|z (OCoLC)1192348663
|z (OCoLC)1240523830
|
050 |
|
4 |
|a QA76.9.V5
|b V5778 2009
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Virtualization for security :
|b including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
|c John Hoopes, technical editor ; Aaron Bawcom [and others].
|
260 |
|
|
|a Burlington, MA :
|b Syngress Pub.,
|c �2009.
|
300 |
|
|
|a 1 online resource (xix, 357 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Virtual computer systems.
|
650 |
|
0 |
|a Virtual storage (Computer science)
|x Security measures.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Syst�emes virtuels (Informatique)
|0 (CaQQLa)201-0029701
|
650 |
|
6 |
|a Ordinateurs
|0 (CaQQLa)201-0235909
|x M�emoires virtuelles
|0 (CaQQLa)201-0235909
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Bases de donn�ees
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0220408
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Database security
|2 fast
|0 (OCoLC)fst00888063
|
650 |
|
7 |
|a Virtual computer systems
|2 fast
|0 (OCoLC)fst01167683
|
700 |
1 |
|
|a Hoopes, John.
|
776 |
0 |
8 |
|i Print version:
|t Virtualization for security.
|d Burlington, MA : Syngress Pub., �2009
|z 9781597493055
|z 1597493058
|w (DLC) 2008044794
|w (OCoLC)233544013
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597493055
|z Texto completo
|