Virtualization for Security

Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

Specificaties
Paperback, 357 blz. | Engels
Syngress Publishing | 1e druk, 2009
ISBN13: 9781597493055
Rubricering
Hoofdrubriek : Computer en informatica
Syngress Publishing 1e druk, 2009 9781597493055
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The only book on all the security applications made possible by virtualization!

In addition to saving time and other resources, virtualization affords unprecendented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network. Migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threads to actual production systems

1. Building a sandbox
Create and isolated environment to run and test applications that might pose a security risk
2. Honeypotting
Build a monitored trap to lure hackers and expose vulnerabilities in your real production environment
3. Malware analysis and anti-virtualization techniques
Quarantine and study harmful code in a safe environment and hide aspects of virtualization from attackers
4. Application testing and debugging
Deploy an application in a simulated real-world environment to test behavior and troubleshoot problems
5. Fuzzing
Test errors in an isolated application by feeding it semirandom data and monitoring without interference
6. Forensic analysis
Take a live "snapshot"to freese and investigate a target machine without altering original data
7. Disaster recovery and high Availability
Decrease downtime by making system backup and resoration easier, faster, and more efficient
8. Dual booting
Use multiple operating systems on the same machine, both natively and in a virtual environment
9. Protection in Untrusted environments
Give users access to a machine that can be used in potentially compromised areas without risk

Specificaties

ISBN13:9781597493055
Taal:Engels
Bindwijze:paperback
Aantal pagina's:357
Druk:1

Over John Hoopes

John Hoopes, Senior Consultant for Verisign, is a graduate of the University of Utah. John's professional background includes an operational/support role on many diverse platforms, including IBM AS/400, IBM Mainframe (OS/390 and Z-Series), AIX, Solaris, Windows, and Linux. John's security expertise focuses on application testing with an emphasis in reverse engineering and protocol analysis. Before becoming a consultant, John was an application security testing lead for IBM, with responsibilities including secure service deployment, external service delivery, and tool development. John has also been responsible for the training and mentoring of team members in network penetration testing and vulnerability assessment. As a consultant, John has lead the delivery of security engagements for clients in the retail, transportation, telecommunication, and banking sectors.

Andere boeken door John Hoopes

Inhoudsopgave

1. Introduction to Virtualization for Security
2. Choosing the right solution for the task
3. Building a Sandbox
4. Configuring the virtual machine
5. Honeypotting
6. Malware analysis
7. Application testing
8. Fuzzing
9. Forensic analysis
10. Distaster recovery
11. High Availability: Reset to good
12. Best of both worlds: Dual booting
13. Protection in untrusted environments
14. Training

Index

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Virtualization for Security