Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200865 a 4500 
001    370436134 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cn||||||||| 
008    090604s2009    maua    ob    001 0 eng d 
019    318240439|a318614030|a463291616|a505132834|a646801211
       |a656471524|a804835856|a1033775634|a1062858471|a1086557674
       |a1152977371|a1162146119|a1192348663|a1240523830 
020    9781597493055 
020    1597493058 
020    9780080879352|q(electronic bk.) 
020    0080879357|q(electronic bk.) 
020    9786612034640 
020    6612034645 
020    1282034642 
020    9781282034648 
024 8  9786612034640 
029 1  AU@|b000067094912 
029 1  CDX|b9833599 
029 1  CHBIS|b006041508 
029 1  CHNEW|b001009003 
029 1  CHVBK|b19962853X 
029 1  DEBBG|bBV040902069 
029 1  DEBBG|bBV042305267 
029 1  DEBSZ|b378295187 
029 1  DEBSZ|b38138134X 
029 1  DEBSZ|b405324561 
029 1  NZ1|b15189160 
035    (OCoLC)370436134|z(OCoLC)318240439|z(OCoLC)318614030
       |z(OCoLC)463291616|z(OCoLC)505132834|z(OCoLC)646801211
       |z(OCoLC)656471524|z(OCoLC)804835856|z(OCoLC)1033775634
       |z(OCoLC)1062858471|z(OCoLC)1086557674|z(OCoLC)1152977371
       |z(OCoLC)1162146119|z(OCoLC)1192348663|z(OCoLC)1240523830 
037    161192:161371|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    OPELS|beng|epn|cOPELS|dOPELS|dOCLCQ|dLGG|dN$T|dCDX|dUBY
       |dIDEBK|dE7B|dCNCGM|dYDXCP|dB24X7|dUMI|dOCLCQ|dDEBSZ
       |dOCLCQ|dCOO|dLIV|dOCLCQ|dNLE|dOCLCQ|dOCLCF|dAUD|dD6H|dCEF
       |dWYU|dUAB|dLEAUB|dOCLCQ|dUHL|dVT2|dVLY|dOCLCO|dOCLCQ
       |dOCLCO|dOCLCL 
049    INap 
082 04 005.8 
082 04 005.8|222 
099    eBook O’Reilly for Public Libraries 
245 00 Virtualization for security :|bincluding sandboxing, 
       disaster recovery, high availability, forensic analysis, 
       and honeypotting /|cJohn Hoopes, technical editor ; Aaron 
       Bawcom [and others].|h[O'Reilly electronic resource] 
260    Burlington, MA :|bSyngress Pub.,|c©2009. 
300    1 online resource (xix, 357 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Includes index. 
504    Includes bibliographical references and index. 
505 0  An introduction to virtualization -- Choosing the right 
       solution for the task -- Building a sandbox -- Configuring
       the virtual machine -- Honeypotting -- Malware analysis --
       Application testing -- Fuzzing -- Forensic analysis -- 
       Disaster recovery -- High availability : reset to good -- 
       Best of both worlds : dual booting -- Protection in 
       untrusted environments -- Training. 
520    One of the biggest buzzwords in the IT industry for the 
       past few years, virtualization has matured into a 
       practical requirement for many best-practice business 
       scenarios, becoming an invaluable tool for security 
       professionals at companies of every size. In addition to 
       saving time and other resources, virtualization affords 
       unprecedented means for intrusion and malware detection, 
       prevention, recovery, and analysis. Taking a practical 
       approach in a growing market underserved by books, this 
       hands-on title is the first to combine in one place the 
       most important and sought-after uses of virtualization for
       enhanced security, including sandboxing, disaster recovery
       and high availability, forensic analysis, and 
       honeypotting. 
546    English. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Virtual computer systems. 
650  0 Virtual storage (Computer science)|xSecurity measures. 
650  0 Database security. 
650  6 Systèmes virtuels (Informatique) 
650  6 Ordinateurs|xMémoires virtuelles|xSécurité|xMesures. 
650  6 Bases de données|xSécurité|xMesures. 
650  7 Database security|2fast 
650  7 Virtual computer systems|2fast 
700 1  Hoopes, John. 
776 08 |iPrint version:|tVirtualization for security.|dBurlington,
       MA : Syngress Pub., ©2009|z9781597493055|z1597493058
       |w(DLC)  2008044794|w(OCoLC)233544013 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781597493055/?ar
       |zAvailable on O’Reilly for Public Libraries 
891    .o10897999 
938    Books 24x7|bB247|nbks00032213 
938    Coutts Information Services|bCOUT|n9833599 
938    EBSCOhost|bEBSC|n249333 
938    YBP Library Services|bYANK|n2983251 
994    92|bJFN