LEADER 00000cam a2200865 a 4500 001 370436134 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cn||||||||| 008 090604s2009 maua ob 001 0 eng d 019 318240439|a318614030|a463291616|a505132834|a646801211 |a656471524|a804835856|a1033775634|a1062858471|a1086557674 |a1152977371|a1162146119|a1192348663|a1240523830 020 9781597493055 020 1597493058 020 9780080879352|q(electronic bk.) 020 0080879357|q(electronic bk.) 020 9786612034640 020 6612034645 020 1282034642 020 9781282034648 024 8 9786612034640 029 1 AU@|b000067094912 029 1 CDX|b9833599 029 1 CHBIS|b006041508 029 1 CHNEW|b001009003 029 1 CHVBK|b19962853X 029 1 DEBBG|bBV040902069 029 1 DEBBG|bBV042305267 029 1 DEBSZ|b378295187 029 1 DEBSZ|b38138134X 029 1 DEBSZ|b405324561 029 1 NZ1|b15189160 035 (OCoLC)370436134|z(OCoLC)318240439|z(OCoLC)318614030 |z(OCoLC)463291616|z(OCoLC)505132834|z(OCoLC)646801211 |z(OCoLC)656471524|z(OCoLC)804835856|z(OCoLC)1033775634 |z(OCoLC)1062858471|z(OCoLC)1086557674|z(OCoLC)1152977371 |z(OCoLC)1162146119|z(OCoLC)1192348663|z(OCoLC)1240523830 037 161192:161371|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 OPELS|beng|epn|cOPELS|dOPELS|dOCLCQ|dLGG|dN$T|dCDX|dUBY |dIDEBK|dE7B|dCNCGM|dYDXCP|dB24X7|dUMI|dOCLCQ|dDEBSZ |dOCLCQ|dCOO|dLIV|dOCLCQ|dNLE|dOCLCQ|dOCLCF|dAUD|dD6H|dCEF |dWYU|dUAB|dLEAUB|dOCLCQ|dUHL|dVT2|dVLY|dOCLCO|dOCLCQ |dOCLCO|dOCLCL 049 INap 082 04 005.8 082 04 005.8|222 099 eBook O’Reilly for Public Libraries 245 00 Virtualization for security :|bincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /|cJohn Hoopes, technical editor ; Aaron Bawcom [and others].|h[O'Reilly electronic resource] 260 Burlington, MA :|bSyngress Pub.,|c©2009. 300 1 online resource (xix, 357 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 500 Includes index. 504 Includes bibliographical references and index. 505 0 An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training. 520 One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting. 546 English. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Virtual computer systems. 650 0 Virtual storage (Computer science)|xSecurity measures. 650 0 Database security. 650 6 Systèmes virtuels (Informatique) 650 6 Ordinateurs|xMémoires virtuelles|xSécurité|xMesures. 650 6 Bases de données|xSécurité|xMesures. 650 7 Database security|2fast 650 7 Virtual computer systems|2fast 700 1 Hoopes, John. 776 08 |iPrint version:|tVirtualization for security.|dBurlington, MA : Syngress Pub., ©2009|z9781597493055|z1597493058 |w(DLC) 2008044794|w(OCoLC)233544013 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781597493055/?ar |zAvailable on O’Reilly for Public Libraries 891 .o10897999 938 Books 24x7|bB247|nbks00032213 938 Coutts Information Services|bCOUT|n9833599 938 EBSCOhost|bEBSC|n249333 938 YBP Library Services|bYANK|n2983251 994 92|bJFN