Record ID | marc_loc_updates/v37.i09.records.utf8:6000104:1453 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v37.i09.records.utf8:6000104:1453?format=raw |
LEADER: 01453cam a22002894a 4500
001 2008044794
003 DLC
005 20090224154101.0
008 081023s2009 maua 001 0 eng
010 $a 2008044794
020 $a9781597493055 (pbk.)
020 $a1597493058 (pbk.)
035 $a(OCoLC)ocn233544013
035 $a(OCoLC)233544013
040 $aDLC$cDLC$dBTCTA$dYDXCP$dC#P$dBWX$dIXA$dDLC
050 00 $aQA76.9.V5$bV5778 2009
082 00 $a005.8$222
245 00 $aVirtualization for security :$bincluding sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting /$cJohn Hoopes, technical editor ; Aaron Bawcom ... [et al.].
260 $aBurlington, MA :$bSyngress Pub.,$cc2009.
300 $axix, 357 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aAn introduction to virtualization -- Choosing the right solution for the task -- Building a sandbox -- Configuring the virtual machine -- Honeypotting -- Malware analysis -- Application testing -- Fuzzing -- Forensic analysis -- Disaster recovery -- High availability : reset to good -- Best of both worlds : dual booting -- Protection in untrusted environments -- Training.
650 0 $aVirtual computer systems.
650 0 $aVirtual storage (Computer science)$xSecurity measures.
650 0 $aDatabase security.
700 1 $aHoopes, John.
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy0902/2008044794-d.html