Criterios de búsqueda

Gran Área: Ciencias exactas y naturales

Búsqueda

 


Resultado: 9357 registro(s)

8824

Virtualization

From the Desktop to the Enterprise

 

13th ed. Berkeley, CA: Apress, Inc., 2005.

ISBNs 9781590594957 9781430200277

Colección: SpringerLink


Cobertura temática

Acceder

21672

Virtualization and Forensics

A Digital Forensic Investigator's Guide to Virtual Environments

 

Syngress, 2010.

ISBNs 9781597495578

Colección: ScienceDirect

Resumen (en inglés): Best Digital Forensics Books 2011, InfoSec Reviews

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes the need for organizations using virtualization to be proactive rather than reactive. Being proactive means learning the methods in this book to train staff, so when an incident occurs, they can quickly perform the forensics and minimize the damage to their systems.
The book is organized into three parts. Part I deals with the virtualization process and the different types of virtualized environments. It explains how virtualization happens along with the various methods of virtualization, hypervisors, and the main categories of virtualization. It discusses server virtualization, desktop virtualization, and the various portable virtualization programs, emulators, and appliances. Part II details how virtualization interacts with the basic forensic process. It describes the methods used to find virtualization artifacts in dead and live environments, and identifies the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization.

  • Named a 2011 Best Digital Forensics Book by InfoSec Reviews
  • Gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun
  • Covers technological advances in virtualization tools, methods, and issues in digital forensic investigations
  • Explores trends and emerging technologies surrounding virtualization technology


Cobertura temática

Acceder

21673

Virtualization for Security

Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

 

Syngress, 2009.

ISBNs 9781597493055

Colección: ScienceDirect

Resumen (en inglés): One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.

Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.

Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.

About the Technologies

A sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.

Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.

A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.

* The first book to collect a comprehensive set of all virtualization security tools and strategies in a single volume
* Covers all major virtualization platforms, including market leader VMware, Xen, and Microsoft's Hyper-V virtualization platform, a new part of Windows Server 2008 releasing in June 2008
* Breadth of coverage appeals to a wide range of security professionals, including administrators, researchers, consultants, and forensic


Cobertura temática

Acceder

21674

Virtualization with Microsoft Virtual Server 2005

 

Syngress, 2006.

ISBNs 9781597491068

Colección: ScienceDirect

Resumen (en inglés): A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.

This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.

* Examines in detail the default and custom installation of Microsoft's Virtual Server 2005
* Addresses th important topics of server requirements and the cost implications involved
* Looks at addressing IT costs and the benefits to the organisation


Cobertura temática

Acceder

21675

Virtualization with Xen™

XenEnterprise, ™ XenServer, ™ and XenExpress ™

 

Syngress, 2007.

ISBNs 9781597491679

Colección: ScienceDirect

Resumen (en inglés): Complete Coverage of Xen, Including Version 3.2
Virtualization with Xen is the first book to demonstrate to readers how to install, administer, and maintain a virtual infrastructure based on XenSource’s latest release, Xen 3.2. It discusses best practices for setting up a Xen environment correctly the first time, maximizing the utilization of server assets while taking advantage of the fastest and most secure enterprise-grade paravirtualization architecture. It covers both basic and advanced topics, such as planning and installation, physical-to-virtual migrations, virtual machine provisioning, resource management, and monitoring and troubleshooting guests and Xen hosts.

* Explore Xen’s Virtualization Model
Find a complete overview of the architecture model as well of all products: Xen 3.0 , Xen Express, XenServer, and Xen Enterprise.
* Deploy Xen
Understand the system requirements, learn installation methods, and see how to install Xen on a free Linux distribution.
* Master the Administrator Console
Learn how to use the command-line tools and the remote Java-based consoler that manages the configuration and operations of XenServer hosts and VMs.
* Manage Xen with Third-Party Tools
Use products like openQRM, Enomalism, and Project ConVirt to manage the VMM.
* Deploy a Virtual Machine in Xen
Learn about workload planning and installing modified guests, unmodified guests, and Windows guests.
* Explore Advanced Xen Concepts
Build a Xen Cluster, complete a XenVM migration, and discover XenVM backup and recovery solutions.
* See the Future of Virtualization
See the unofficial Xen road map and what virtual infrastructure holds for tomorrow’s data center.
* See Other Virtualization Technologies and How They Compare with Xen
Take a look at the different types of server virtualization, other virtual machine software available, and how they compare with Xen.

*Complete with a demonstration version of Xen 3.2 on CD-ROM
*Xen has the lead in the open-source community; now distributed as a standard kernel package for Novell’s SLES 10 and Red Hat’s RHEL 5 and Fedora Core 6 Linux distributions
*Covers installation, administration, management, monitoring, and deployment planning and strategies


Cobertura temática

Acceder

26568

Virus Ecology and Disturbances

Impact of Environmental Disruption on the Viruses of Microorganisms

 

Frontiers Media SA, 2015.

Título de la serie/colección: Frontiers Research Topics. ISSN 1664-8714,

ISBNs 9782889194483

Colección: Directory of Open Access Books


Cobertura temática

Acceder

21677

Virus-Insect-Plant Interactions

 

Academic Press, 2001.

ISBNs 9780123276810

Colección: ScienceDirect

Resumen (en inglés): In Virus-Insect-Plant Interactions, the world's leading scientists discuss the latest breakthroughs in understanding the biological and ecological factors that define these complex transmission systems and how this knowledge might be used to our advantage in producing innovative, user and environmentally friendly approaches to controlling the spread of plant pathogens by insects. This is an invaluable reference work for researchers, teachers, and students. There are many quick-reference figures and tables, the contents pages include individual chapter abstracts, and each chapter ends with its own bibliography.

Key Features
* presents the most significant research breakthroughs of the past two decades
* contains eighteen chapters by forty-two world-renowned researchers
* invaluable reference work for researchers, teachers and students
* each chapter ends with its own bibliography
* contents pages of forematter include individual chapter abstracts
* contains many quick-reference figures and tables


Cobertura temática

Acceder

21678

Viruses and Environment

 

Academic Press, 1978.

ISBNs 9780124297661

Colección: ScienceDirect

Resumen (en inglés): Viruses and Environment contains the proceedings of the Third International Conference on Comparative Virology, held at Mont Gabriel, Quebec, Canada on May 1977. The primary focus of the conference is the ecology of viruses, that is, the interrelationships between organisms and their environment.
Organized into seven parts with a total of 33 chapters, this book centers on the impact of viruses on the environment; the persistent virus infections of man, vertebrate and invertebrate animals, and plants; and the smallest disease agents, the viroids. In particular, this book describes the reservoirs of viruses, such as arthropod vectors, water, cultivated plants, and wild animals; safety considerations concerning the use of live virus vaccines; and the viral insecticides. The use of bacterial viruses in genetic engineering is also addressed.
This treatise will be valuable to research workers in medical and biomedical fields; biological control; and animal and plant quarantine. It will also benefit the university teachers and graduate students.


Cobertura temática

Acceder

21679

Viruses in Food and Water

Risks, Surveillance and Control

 

Woodhead Publishing, 2013.

ISBNs 9780857094308

Colección: ScienceDirect

Resumen (en inglés): Viruses can be highly infectious and are capable of causing widespread disease outbreaks. The significance of viral pathogens in food and waterborne illness is increasingly being recognised and viruses transferred by these routes are important areas of research. Viruses in food and water reviews the risks, surveillance and control of food and waterborne viral disease.

Part one provides an introduction to food and environmental virology. Part two goes on to explore methods of detection, surveillance and risk assessment of viruses in food and water; it includes chapters on molecular detection of viruses in foods and food processing environments, quality control in the analytical laboratory, and quantitative risk assessment for food and waterborne viruses. Part three focuses on virus transmission routes and control of food and water contamination. It contains chapters on fresh produce, shellfish and viral presence, and control methods in waste water and sewage. Finally, part four highlights particular pathogens including norovirus, hepatitis A and emerging zoonotic viruses.

Viruses in food and water is a standard reference book for microbiologists in academia, analytical labs and the food and water treatment industries, as well as environmental health professionals and researchers working on foodborne viruses.

  • Explores methods of detection, surveilance and risk assessment of viruses in food and water
  • Considers virus transmission routes and control of food and water contamination
  • Highlights advances in the understanding of specific pathogens, including norovirus, hepatitis A and rotaviruses and the advances in vaccine development


Cobertura temática

Acceder

7935

Viruses in Foods

 

13th ed. Boston, MA: Springer Science+Business Media, 2006.

Título de la serie/colección: Food Microbiology and Food Safety.

ISBNs 9780387289359 9780387292519

Colección: SpringerLink


Cobertura temática

Acceder


Los iconos de las disciplinas fueron generados desde flaticon.com bajo licencia CC BY.