Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources...
Call Number: | Libro Electrónico |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Burlington, MA :
Syngress Pub.,
�2009.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- An introduction to virtualization
- Choosing the right solution for the task
- Building a sandbox
- Configuring the virtual machine
- Honeypotting
- Malware analysis
- Application testing
- Fuzzing
- Forensic analysis
- Disaster recovery
- High availability : reset to good
- Best of both worlds : dual booting
- Protection in untrusted environments
- Training.