Virtualization and forensics a digital forensic investigator's guide to virtual environments

Virtualized environments are growing quicker than the predicted pace, and according to O'Reilly's computer book market report, they are the second largest computer book topic in terms of sales for 2008 with a growth of 63%. With more companies using virtual servers and environments, the a...

Descripción completa

Detalles Bibliográficos
Autor principal: Barrett, Diane (-)
Otros Autores: Kipper, Gregory
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier / Syngress c2010.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627806706719
Tabla de Contenidos:
  • Front Cover; Title Page; Copyright Page; Dedication; Table of Contents; Acknowledgments; Introduction; About the Authors; PART 1 VIRTUALIZATION; Chapter 1. How Virtualization Happens; Physical Machines; How Virtualization Works; Virtualizing Operating Systems; Virtualizing Hardware Platforms; Server Virtualization; Hypervisors; Bare-Metal Hypervisor (Type 1); Embedded Hypervisor; Hosted Hypervisor (Type 2); Main Categories of Virtualization; Full Virtualization; Paravirtualization; Hardware-Assisted Virtualization; Operating System Virtualization; Application Server Virtualization
  • Application VirtualizationNetwork Virtualization; Storage Virtualization; Service Virtualization; Benefits of Virtualization; Cost of Virtualization; Summary; References; Bibliography; Chapter 2. Server Virtualization; What Is Server Virtualization?; The Purpose of Server Virtualization; Server Virtualization: The Bigger Picture; Differences between Desktop and Server Virtualization; Common Virtual Servers; VMware Server; Microsoft Virtual Server; Citrix XenServer; Oracle VM; Summary; References; Bibliography; Chapter 3. Desktop Virtualization; What Is Desktop Virtualization?
  • Why Is It Useful?Common Virtual Desktops; VMware; VMware Fusion; Microsoft Virtual PC; Parallels; Sun VirtualBox; Xen; Virtual Appliances and Forensics; Penguin Sleuth Kit; The Revealer Toolkit; Intelica IP Inspect Virtual Appliance; Helix 2008R1; CAINE 0.3; Virtual Desktops as a Forensic Platform; Summary; Bibliography; Chapter 4. Portable Virtualization, Emulators, and Appliances; MojoPac; MokaFive; Preconfigured Virtual Environments; VMware; Microsoft; Parallels; Xen; Virtual Appliance Providers; JumpBox Virtual Appliances; VirtualBox; Virtualization Hardware Devices
  • Virtual Privacy MachineVirtual Emulators; Bochs; DOSBox; Future Development; Summary; References; Bibliography; PART 2 FORENSICS; Chapter 5. Investigating Dead Virtual Environments; Install Files; VMware Server; VMware Workstation; Microsoft Virtual PC - Microsoft Virtual PC 2007; MojoPac; MokaFive; Virtual Privacy Machine; Bochs; DOSBox; Remnants; MojoPac; MokaFive; Virtual Privacy Machine; VMware; Microsoft; Citrix Xen; Bochs; DOSBox; Virtual Appliances; Registry; MojoPac; MokaFive; Bochs; DOSBox; VMware and Microsoft; Microsoft Disk Image Formats; Data to Look for; Investigator Tips
  • SummaryReferences; Bibliography; Chapter 6. Investigating Live Virtual Environments; The Fundamentals of Investigating Live Virtual Environments; Best Practices; Virtual Environments; Artifacts; Processes and Ports; Virtual Environment File Ports and Processes; VMware and Tomcat; IronKey and Tor; SPICE; Log Files; VM Memory Usage; Memory Management; Memory Analysis; ESXi Analysis; Microsoft Analysis Tools; Moving Forward; Trace Collection for a Virtual Machine; Separate Swap Files Corresponding to Different Virtual Machines in a Host Computer System
  • Profile Based Creation of Virtual Machines in a Virtualization Environment