

John Hoopes, Senior Consultant for Verisign, is a graduate of the University of Utah. John's professional background includes an operational/support role on many diverse platforms, including IBM AS/400, IBM Mainframe (OS/390 and Z-Series), AIX, Solaris, Windows, and Linux.
Meer over John HoopesVirtualization for Security
Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Samenvatting
The only book on all the security applications made possible by virtualization!
In addition to saving time and other resources, virtualization affords unprecendented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network. Migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threads to actual production systems
1. Building a sandbox
Create and isolated environment to run and test applications that might pose a security risk
2. Honeypotting
Build a monitored trap to lure hackers and expose vulnerabilities in your real production environment
3. Malware analysis and anti-virtualization techniques
Quarantine and study harmful code in a safe environment and hide aspects of virtualization from attackers
4. Application testing and debugging
Deploy an application in a simulated real-world environment to test behavior and troubleshoot problems
5. Fuzzing
Test errors in an isolated application by feeding it semirandom data and monitoring without interference
6. Forensic analysis
Take a live "snapshot"to freese and investigate a target machine without altering original data
7. Disaster recovery and high Availability
Decrease downtime by making system backup and resoration easier, faster, and more efficient
8. Dual booting
Use multiple operating systems on the same machine, both natively and in a virtual environment
9. Protection in Untrusted environments
Give users access to a machine that can be used in potentially compromised areas without risk
Specificaties
Inhoudsopgave
2. Choosing the right solution for the task
3. Building a Sandbox
4. Configuring the virtual machine
5. Honeypotting
6. Malware analysis
7. Application testing
8. Fuzzing
9. Forensic analysis
10. Distaster recovery
11. High Availability: Reset to good
12. Best of both worlds: Dual booting
13. Protection in untrusted environments
14. Training
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht