"Ordinateurs Mémoires virtuelles Sécurité Mesures." . . "Bases de données Sécurité Mesures." . . "COMPUTERS Security General." . . "Hoopes, John" . . "Virtual computer systems. Virtual storage (Computer sciences) Security measures. Database security." . . "Virtual computer systems." . . "Systèmes informatiques Mesures de sûreté." . . . . "COMPUTERS Networking Security." . . "Computer networks Security measures." . . "Virtual storage (Computer science) Security measures." . . "Bases de données Conception." . . "Virtual computer systems Security measures." . . "Computer security." . . "Systèmes virtuels (informatique)." . . "Systèmes virtuels (Informatique)" . "Bazy danych środki zabezpieczające." . . "Electronic books." . . "Protection des données." . . "Analyse de systèmes." . . "Llibres electrònics" . . "Virtualization for Security" . . . . . . . . . . . . . "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ; [the only book on all the security applications made possible by virtualization ; comprehensive coverage of the many uses of virtualization technology for an enhanced security posture ; broad technique-based approach useful for every security professional, from administrators and researchers to consultants and forensic investigators ; covers many virtualization options, including choosing the right solution for the task, configuration, and use in dual booting, training and protection]" . . . "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting."@en . "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting." . . . . "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting / technical editor John Hoopes ; [aut.] Aaron Bawcom [et al.]" . . "Electronic books"@en . "Electronic books" . . . . . . . . . . . . . . . "The only book to combine in one place all the hot virtualization applications security professionals are searching for!"@en . . . . "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting" . . . . . . . . . . . . . "Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting" . "One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place these most important and sought-after uses of virtualization for enhanced security. Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. With this growth in adoption, security is becoming a much more serious concern. This book provides security professionals with the virtualization tools they?ll need to function effectively and efficiently in this game-changing landscape. Tactics include isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems." . . . . "Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting" . . "Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting"@en . . . . . . "Virtualization for Security Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting"@en . . "Firewalls (Computer security)" . . "COMPUTERS Internet Security." . . "Virtual storage (Computer sciences)" . . "Systemy wirtualne (informatyka)." . . "Wireless communication systems Security measures." . . "Komputery środki bezpieczeństwa." . . "Sécurité informatique." . . "Pamięci wirtualne (informatyka)." . .