Sold Out
Book Categories |
Ch. 1 An Introduction to Virtualization 1
Ch. 2 Choosing the Right Solution for the Task 45
Ch. 3 Building a Sandbox 63
Ch. 4 Configuring the Virtual Machine 91
Ch. 5 Honeypotting 117
Ch. 6 Malware Analysis 145
Ch. 7 Application Testing 191
Ch. 8 Fuzzing 211
Ch. 9 Forensic Analysis 229
Ch. 10 Disaster Recovery 255
Ch. 11 High Availability: Reset to Good 271
Ch. 12 Best of Both Worlds: Dual Booting 289
Ch. 13 Protection in Untrusted Environments 301
Ch. 14 Training 329
Index 349
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionVirtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
X
This Item is in Your InventoryVirtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
X
You must be logged in to review the productsX
X
X
Add Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, , Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting to the inventory that you are selling on WonderClubX
X
Add Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, , Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting to your collection on WonderClub |