Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

Buy
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.

Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.

Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.

About the Author

John Hoopes, Senior Consultant for Verisign, is a graduate of the University of Utah. John's professional background includes an operational/support role on many diverse platforms, including IBM AS/400, IBM Mainframe (OS/390 and Z-Series), AIX, Solaris, Windows, and Linux. John's security expertise focuses on application testing with an emphasis in reverse engineering and protocol analysis. Before becoming a consultant, John was an application security testing lead for IBM, with responsibilities including secure service deployment, external service delivery, and tool development. John has also been responsible for the training and mentoring of team members in network penetration testing and vulnerability assessment. As a consultant, John has lead the delivery of security engagements for clients in the retail, transportation, telecommunication, and banking sectors.

(HTML tags aren't allowed.)

MCSA/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 System Administration, 70-228, Second Edition
MCSA/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 System Administration, 70-228, Second Edition

Learn how to install, configure and troubleshoot SQL Server 2000—and prepare for the Microsoft Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace through the lessons and hands-on exercises. And use the special exam-prep section and testing tool to measure what you know and where to focus...

.NET Programming 10-Minute Solutions
.NET Programming 10-Minute Solutions
This book grew out of an ongoing popular series of short, to-the-point technical articles on DevX.com (http://www.devx.com) called 10-Minute Solutions, which fuse the “Ask the Expert”-type question-and-answer format with the more comprehensive tutorial-type article. Melding the two provides authors not only with a forum for presenting...
Evoked Spinal Cord Potentials: An illustrated Guide to Physiology, Pharmocology, and Recording Techniques
Evoked Spinal Cord Potentials: An illustrated Guide to Physiology, Pharmocology, and Recording Techniques
The technique of using evoked spinal cord potentials (SCPs) has become an important clinical tool for monitoring spinal cord surgery and diagnosing spinal cord diseases. The technique is a result both of the technical development of recording evoked SCPs from the epidural space without perforation of the dura mater and of the...

Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
The third International Symposium on Intelligent Informatics (ISI-2014) provided a forum for sharing original research results and practical development experiences among experts in the emerging areas of Intelligent Informatics. This edition was co-located with third International Conference on Advances in Computing, Communications...
Stockley's Drug Interactions 2009 Pocket Companion
Stockley's Drug Interactions 2009 Pocket Companion
This new edition continues to provide the busy health care professional with a small and conveniently sized quick reference "Stockley" text. "Stockley's Drug Interactions Pocket Companion 2009" draws on the wealth of clinically evaluated, evidence-based information on drug-drug, drug-herb and drug-food interactions that is...
Medical Malpractice: A Physician's Sourcebook
Medical Malpractice: A Physician's Sourcebook

Books such as this one are deceptively difficult to create. The general subject is neither happy, nor easy, nor most anyone’s idea of fun. M- practice litigation, however, has become a central fact of existence in the practice of medicine today. This tsunami of lawsuits has led to a high volume of irreconcilable rhetoric and ultimately...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy