Virtualization and forensics a digital forensic investigator's guide to virtual environments
Virtualized environments are growing quicker than the predicted pace, and according to O'Reilly's computer book market report, they are the second largest computer book topic in terms of sales for 2008 with a growth of 63%. With more companies using virtual servers and environments, the a...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier / Syngress
c2010.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627806706719 |
Tabla de Contenidos:
- Front Cover; Title Page; Copyright Page; Dedication; Table of Contents; Acknowledgments; Introduction; About the Authors; PART 1 VIRTUALIZATION; Chapter 1. How Virtualization Happens; Physical Machines; How Virtualization Works; Virtualizing Operating Systems; Virtualizing Hardware Platforms; Server Virtualization; Hypervisors; Bare-Metal Hypervisor (Type 1); Embedded Hypervisor; Hosted Hypervisor (Type 2); Main Categories of Virtualization; Full Virtualization; Paravirtualization; Hardware-Assisted Virtualization; Operating System Virtualization; Application Server Virtualization
- Application VirtualizationNetwork Virtualization; Storage Virtualization; Service Virtualization; Benefits of Virtualization; Cost of Virtualization; Summary; References; Bibliography; Chapter 2. Server Virtualization; What Is Server Virtualization?; The Purpose of Server Virtualization; Server Virtualization: The Bigger Picture; Differences between Desktop and Server Virtualization; Common Virtual Servers; VMware Server; Microsoft Virtual Server; Citrix XenServer; Oracle VM; Summary; References; Bibliography; Chapter 3. Desktop Virtualization; What Is Desktop Virtualization?
- Why Is It Useful?Common Virtual Desktops; VMware; VMware Fusion; Microsoft Virtual PC; Parallels; Sun VirtualBox; Xen; Virtual Appliances and Forensics; Penguin Sleuth Kit; The Revealer Toolkit; Intelica IP Inspect Virtual Appliance; Helix 2008R1; CAINE 0.3; Virtual Desktops as a Forensic Platform; Summary; Bibliography; Chapter 4. Portable Virtualization, Emulators, and Appliances; MojoPac; MokaFive; Preconfigured Virtual Environments; VMware; Microsoft; Parallels; Xen; Virtual Appliance Providers; JumpBox Virtual Appliances; VirtualBox; Virtualization Hardware Devices
- Virtual Privacy MachineVirtual Emulators; Bochs; DOSBox; Future Development; Summary; References; Bibliography; PART 2 FORENSICS; Chapter 5. Investigating Dead Virtual Environments; Install Files; VMware Server; VMware Workstation; Microsoft Virtual PC - Microsoft Virtual PC 2007; MojoPac; MokaFive; Virtual Privacy Machine; Bochs; DOSBox; Remnants; MojoPac; MokaFive; Virtual Privacy Machine; VMware; Microsoft; Citrix Xen; Bochs; DOSBox; Virtual Appliances; Registry; MojoPac; MokaFive; Bochs; DOSBox; VMware and Microsoft; Microsoft Disk Image Formats; Data to Look for; Investigator Tips
- SummaryReferences; Bibliography; Chapter 6. Investigating Live Virtual Environments; The Fundamentals of Investigating Live Virtual Environments; Best Practices; Virtual Environments; Artifacts; Processes and Ports; Virtual Environment File Ports and Processes; VMware and Tomcat; IronKey and Tor; SPICE; Log Files; VM Memory Usage; Memory Management; Memory Analysis; ESXi Analysis; Microsoft Analysis Tools; Moving Forward; Trace Collection for a Virtual Machine; Separate Swap Files Corresponding to Different Virtual Machines in a Host Computer System
- Profile Based Creation of Virtual Machines in a Virtualization Environment