語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Virtualization for security[electron...
~
Hoopes, John.
Virtualization for security[electronic resource] :including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8
書名/作者:
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting // John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
其他作者:
Hoopes, John.
出版者:
Burlington, MA : : Syngress Pub.,, c2009.
面頁冊數:
xix, 357 p. : : ill. ;; 24 cm.
附註:
Includes index.
標題:
Virtual computer systems.
標題:
Virtual storage (Computer science) - Security measures.
標題:
Database security.
ISBN:
9781597493055
ISBN:
1597493058
內容註:
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
摘要、提要註:
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
電子資源:
An electronic book accessible through the World Wide Web; click for information
Virtualization for security[electronic resource] :including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
Virtualization for security
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /[electronic resource] :John Hoopes, technical editor ; Aaron Bawcom ... [et al.]. - Burlington, MA :Syngress Pub.,c2009. - xix, 357 p. :ill. ;24 cm.
Includes index.
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2009.
Mode of access: World Wide Web.
ISBN: 9781597493055
Source: 161192:161371Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
219299
Virtual computer systems.
Index Terms--Genre/Form:
336502
Electronic books.
LC Class. No.: QA76.9.V5 / V5778 2009
Dewey Class. No.: 005.8
Virtualization for security[electronic resource] :including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
LDR
:02858cam 2200337Ia 4500
001
338291
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
110620s2009 maua o 001 0 eng d
020
$a
9781597493055
020
$a
1597493058
035
$a
(OCoLC)370436134
035
$a
ocn370436134
037
$a
161192:161371
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.V5
$b
V5778 2009
082
0 4
$a
005.8
$2
22
245
0 0
$a
Virtualization for security
$h
[electronic resource] :
$b
including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /
$c
John Hoopes, technical editor ; Aaron Bawcom ... [et al.].
260
$a
Burlington, MA :
$b
Syngress Pub.,
$c
c2009.
300
$a
xix, 357 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
520
$a
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2009.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on June 3, 2009).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Virtual computer systems.
$3
219299
650
0
$a
Virtual storage (Computer science)
$x
Security measures.
$3
405735
650
0
$a
Database security.
$3
385883
655
7
$a
Electronic books.
$2
local
$3
336502
700
1
$a
Hoopes, John.
$3
405734
710
2
$a
ScienceDirect (Online service)
$3
365609
776
1
$c
Original
$z
9781597493055
$z
1597493058
$w
(DLC) 2008044794
$w
(OCoLC)233544013
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9781597493055
http://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597493055
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入