Virtualization for security [electronic resource] : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting / John Hoopes, technical editor ; Aaron Bawcom ... [et al.].Material type: TextPublisher: Burlington, MA : Syngress Pub., c2009Description: 1 online resource (xix, 357 p.) : illISBN: 9781597493055; 1597493058; 9780080879352 (electronic bk.); 0080879357 (electronic bk.)Subject(s): Virtual computer systems | Virtual storage (Computer science) -- Security measures | Database security | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computer security | Virtual storage (Computer science) / Security measures | Virtual computer systems / Security measures | Computer networks / Security measures | Wireless communication systems / Security measures | Firewalls (Computer security)Genre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Virtualization for security.DDC classification: 005.8 LOC classification: QA76.9.V5 | V5778 2009Online resources: ScienceDirect
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
An introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
Description based on print version record.
Includes bibliographical references and index.