메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1-254

Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

(2)  Barrett, Diane a   Kipper, Gregory a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84920476925     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/C2009-0-61118-1     Document Type: Book
Times cited : (25)

References (129)
  • 2
    • 84882368610 scopus 로고    scopus 로고
    • Gartner: CIOs look to lighter-weight, social technologies to transform IT
    • January 20, Retrieved from
    • D. Dubie (2010, January 20) Gartner: CIOs look to lighter-weight, social technologies to transform IT. Network World http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it?eid=-1533 Retrieved from
    • (2010) Network World
    • Dubie, D.1
  • 4
    • 84882292575 scopus 로고    scopus 로고
    • Emerging technology analysis: hosted virtual desktops
    • February 17, Retrieved from
    • B. Gammage and A. Jump (2009, February 17) Emerging technology analysis: hosted virtual desktops. Gartner group http://www.gartner.com/DisplayDocument?ref=g_search&id=887912&subref=simplesearch Retrieved from
    • (2009) Gartner group
    • Gammage, B.1    Jump, A.2
  • 5
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: security challenges in virtual machine based computing environments
    • June 12–15. Santa Fe, NM.
    • T. Garfinkel and M. Rosenblum (2005) When virtual is harder than real: security challenges in virtual machine based computing environments. Proceedings of the 10th Workshop on Hot Topics in Operating Systems June 12–15. Santa Fe, NM
    • (2005) Proceedings of the 10th Workshop on Hot Topics in Operating Systems
    • Garfinkel, T.1    Rosenblum, M.2
  • 6
    • 84882391896 scopus 로고    scopus 로고
    • Gartner predicts nearly half of server workloads will be virtualized
    • October 20, Retrieved from
    • E. Messmer (2009, October 20) Gartner predicts nearly half of server workloads will be virtualized. Network World http://www.networkworld.com/news/2009/102009-gartner-server-virtualization.html Retrieved from
    • (2009) Network World
    • Messmer, E.1
  • 8
    • 84882401287 scopus 로고    scopus 로고
    • Rise of the virtual machine
    • February, Retrieved from
    • E. Orakwue (2009, February) Rise of the virtual machine. ISSA Journal http://www.issa.org/Library/Journals/2009/February/Orakwue-Rise%20of%20the%20Virtual%20Machine.pdf Retrieved from
    • (2009) ISSA Journal
    • Orakwue, E.1
  • 9
    • 84882333970 scopus 로고    scopus 로고
    • Retrieved from
    • Paravirtualization API version 2.5. Copyright 2005, 2006. VMware, Inc. www.vmware.com/pdf/vmi_specs.pdf Retrieved from
    • Copyright 2005, 2006. VMware, Inc
  • 12
    • 85152333760 scopus 로고    scopus 로고
    • January), Volume 18., Retrieved from
    • Virtual Data Center E-Zine, (2010, January), Volume 18. Retrieved from http://searchdatacenter.techtarget.com/generic/0,295582,sid80_gci1313630,00.html
    • (2010)
  • 13
    • 85152334651 scopus 로고    scopus 로고
    • www.scribd.com/doc/17770659/VirtualizationReport-for-Seminar
  • 14
    • 85152346859 scopus 로고    scopus 로고
    • http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it?eid=-1533
  • 15
    • 85152319974 scopus 로고    scopus 로고
    • http://www.gartner.com/DisplayDocument?id=5651
  • 16
    • 85152304307 scopus 로고    scopus 로고
    • www.wmware.com
  • 17
    • 85152350679 scopus 로고    scopus 로고
    • www.parallels.com
  • 18
    • 85152314071 scopus 로고    scopus 로고
    • http://www.microsoft.com/windows/virtual-pc/
  • 19
    • 85152353240 scopus 로고    scopus 로고
    • http://www.virtualbox.org/manual/UserManual.html
  • 20
    • 85152325576 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html
  • 21
    • 84882396542 scopus 로고    scopus 로고
    • Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan
    • November 30, Retrieved from
    • Frost and Sullivan (2009, November 30) Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan. Frost & Sullivan http://www.frost.com/prod/servlet/press-release.pag?docid=185829213 Retrieved from
    • (2009) Frost & Sullivan
  • 22
    • 84882300377 scopus 로고    scopus 로고
    • Virtualization and virtual machine software. We help you to choose the best VM
    • June
    • D. Kusnetzky (2007, June) Virtualization and virtual machine software. We help you to choose the best VM. Hacking IT Security Magazine
    • (2007) Hacking IT Security Magazine
    • Kusnetzky, D.1
  • 24
    • 84882331775 scopus 로고    scopus 로고
    • What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions
    • March, Retrieved from
    • Y. Suzuki and M. Moriyama (2006, March) What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions. Techrepublic.com http://whitepapers.techrepublic.com.com/abstract.aspx?docid=344989 Retrieved from
    • (2006) Techrepublic.com
    • Suzuki, Y.1    Moriyama, M.2
  • 25
    • 84882354364 scopus 로고    scopus 로고
    • SAN-based storage virtualization: five benefits for your customers
    • October 10, Retrieved from
    • B. Peterson (2007, October 10) SAN-based storage virtualization: five benefits for your customers. Search Storage Channel.com http://searchstoragechannel.techtarget.com/tip/0,289483,sid98_gci1274842,00.html Retrieved from
    • (2007) Search Storage Channel.com
    • Peterson, B.1
  • 26
    • 84882442227 scopus 로고    scopus 로고
    • 10 key differences between desktop and server virtualization deployments
    • November 23, Retrieved from
    • C. Preimesberger (2009, November 23) 10 key differences between desktop and server virtualization deployments. eWeek.com http://www.eweek.com/c/a/Data-Storage/10-Key-Differences-Between-Desktop-and-Server-Virtualization-Deployments-152781/ Retrieved from
    • (2009) eWeek.com
    • Preimesberger, C.1
  • 28
    • 85152337540 scopus 로고    scopus 로고
    • www.wmware.com
  • 29
    • 85152346377 scopus 로고    scopus 로고
    • www.wmware.com
  • 30
    • 85152325798 scopus 로고    scopus 로고
    • www.parallels.com
  • 31
    • 85152335771 scopus 로고    scopus 로고
    • http://www.microsoft.com/windows/virtual-pc/
  • 32
    • 85152350141 scopus 로고    scopus 로고
    • http://www.virtualbox.org/manual/UserManual.html
  • 33
    • 85152336278 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html
  • 34
    • 85152353685 scopus 로고    scopus 로고
    • http://www.linux-forensics.com/
  • 35
    • 85152332775 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/213673
  • 36
    • 85152322518 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/813
  • 37
    • 85152347881 scopus 로고    scopus 로고
    • http://www.e-fense.com/helix3pro
  • 38
    • 85152307248 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/directory/57815
  • 39
    • 85152331171 scopus 로고    scopus 로고
    • http://www.caine-live.net/
  • 41
    • 84882432812 scopus 로고    scopus 로고
    • Parallels virtuozzo containers offers 350 templates
    • Retrieved from
    • D. Marshall (2008) Parallels virtuozzo containers offers 350 templates. InfoWorld virtualization report Retrieved from http://weblog.infoworld.com/virtualization/archives/2008/02/parallels_virtu.html
    • (2008) InfoWorld virtualization report
    • Marshall, D.1
  • 43
    • 85152319449 scopus 로고    scopus 로고
    • RingCube MojoPac
    • http://www.mojopac.com/enterprise/products/index.html RingCube MojoPac
  • 44
    • 85152317853 scopus 로고    scopus 로고
    • Moka5.
    • http://www.moka5.com/products/index.html LivePCs. Moka5
    • LivePCs.
  • 48
    • 85152315937 scopus 로고    scopus 로고
    • www.wmware.com
  • 49
    • 85152304508 scopus 로고    scopus 로고
    • www.parallels.com
  • 50
    • 85152323976 scopus 로고    scopus 로고
    • http://www.xen.org/support/documentation.html
  • 53
    • 85152321647 scopus 로고    scopus 로고
    • http://www.vmware.com/appliances/getting-started/learn/faq.html
  • 54
    • 84882336484 scopus 로고    scopus 로고
    • MetroPipe
    • The free portable privacy machine. http://www.metropipe.net/ppm.php?SID=4e38766ea6a3fab4792ced91b2bdbe48 MetroPipe
    • The free portable privacy machine
  • 55
    • 70350043605 scopus 로고    scopus 로고
    • Hiding in a virtual world using unconventionally installed operating systems.
    • Dallas, TX., Retrieved from
    • Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326%26authDecision=-203
    • (2009) IEEE International Conference on Intelligence and Security Informatics.
    • Bares, R.1
  • 56
    • 79952337297 scopus 로고    scopus 로고
    • Retrieved from
    • Microsoft Corporation (2009) Virtual hard disk image format specification download.microsoft.com/.../Virtual%20Hard%20Disk%20Format%20Spec_10_18_06.doc Retrieved from
    • (2009) Virtual hard disk image format specification
  • 57
    • 33847308562 scopus 로고    scopus 로고
    • Tackling the U3 trend with computer forensics
    • Retrieved from
    • A. Spruill and C. Pavan (2007) Tackling the U3 trend with computer forensics. Journal of Digital Investigation 4(1), http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B7CW4-4N440CB-1&_user=8303832&_coverDate=03%2F31%2F2007&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1285052568&_rerunOrigin=google&_acct=C000000593&_version=1&_urlVersion=0&_userid=8303832&md5=a1cb63ae1f78f6b950cc2a28c540f4ed Retrieved from
    • (2007) Journal of Digital Investigation , vol.4 , Issue.1
    • Spruill, A.1    Pavan, C.2
  • 60
    • 70350043605 scopus 로고    scopus 로고
    • Hiding in a virtual world using unconventionally installed operating systems.
    • Dallas, TX., Retrieved from
    • Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326&authDecision=-203
    • (2009) IEEE International Conference on Intelligence and Security Informatics.
    • Bares, R.1
  • 61
    • 84882425555 scopus 로고    scopus 로고
    • Ghost in the machine: Forensic evidence collection in the virtual environment
    • E.M. Fiterman and J.D. Durick (2010) Ghost in the machine: Forensic evidence collection in the virtual environment. Digital Forensics Magazine 2 73-77
    • (2010) Digital Forensics Magazine , vol.2 , pp. 73-77
    • Fiterman, E.M.1    Durick, J.D.2
  • 62
    • 85152303227 scopus 로고    scopus 로고
    • How to examine the compromised Microsoft Virtual Server 2005 host server after a security breach.
    • Retrieved from, (2007, February 20)
    • Stagner, H. (2007, February 20). How to examine the compromised Microsoft Virtual Server 2005 host server after a security breach. SearchServerVirtualization.com. Retrieved from http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html
    • SearchServerVirtualization.com.
    • Stagner, H.1
  • 63
    • 85152336777 scopus 로고    scopus 로고
    • VMware GSX server documentation http://www.vmware.com/support/gsx25/doc/performance_memory_reserved_gsx.html
  • 64
    • 85152331940 scopus 로고    scopus 로고
    • VMware patents applied for http://www.patentstorm.us/attorney-applications/VMware__Inc_/241723/1.html
  • 65
    • 85152324724 scopus 로고    scopus 로고
    • http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html
  • 67
    • 38349023177 scopus 로고    scopus 로고
    • Attacks on more virtual machine emulators
    • Retrieved from
    • P. Ferrie (2007) Attacks on more virtual machine emulators. Symantic Advanced Threat Research www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf Retrieved from
    • (2007) Symantic Advanced Threat Research
    • Ferrie, P.1
  • 68
    • 84960376125 scopus 로고    scopus 로고
    • September 2008, Updated November, Retrieved from
    • H. Parsonage (September 2008, Updated November 2009) The meaning of linkfiles in forensic examinations http://computerforensics.parsonage.co.uk/downloads/TheMeaningofLIFE.pdf Retrieved from
    • (2009) The meaning of linkfiles in forensic examinations
    • Parsonage, H.1
  • 69
    • 84898096655 scopus 로고    scopus 로고
    • Virtual machine forensics, a discussion of virtual machines related to forensics analysis
    • Retrieved from
    • B. Shavers (2008) Virtual machine forensics, a discussion of virtual machines related to forensics analysis. Forensic Focus http://www.forensicfocus.com Retrieved from
    • (2008) Forensic Focus
    • Shavers, B.1
  • 70
    • 85152337535 scopus 로고    scopus 로고
    • How to detect rogue virtual machines on a network.
    • Retrieved from, Contributor, Accessed 14.03.07.
    • Stagner, H. (2007). How to detect rogue virtual machines on a network. SearchServerVirtualization.com. Retrieved from http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1247530_mem1,00.html. Contributor Accessed 14.03.07
    • (2007) SearchServerVirtualization.com.
    • Stagner, H.1
  • 71
    • 84882316038 scopus 로고    scopus 로고
    • Evidentiary value of link files
    • Retrieved from
    • N. Weilbacher (2006) Evidentiary value of link files. Forensic Focus http://www.forensicfocus.com/link-file-evidentiary-value Retrieved from
    • (2006) Forensic Focus
    • Weilbacher, N.1
  • 72
    • 84882393405 scopus 로고    scopus 로고
    • Inventorying virtual hard disk files on a server or domain
    • Retrieved from
    • C. Wolf (2007) Inventorying virtual hard disk files on a server or domain. Virtualization Review http://virtualizationreview.com/articles/2007/05/01/inventorying-virtualhard-disk-files-on-a-server-or-domain.aspx Retrieved from
    • (2007) Virtualization Review
    • Wolf, C.1
  • 73
    • 84882437914 scopus 로고    scopus 로고
    • Rogue VMs be very afraid
    • Accessed 01.06.08., Retrieved from
    • C. Wolf (2008) Rogue VMs be very afraid. Virtualization Review http://virtualizationreview.com/articles/2008/06/01/rogue-vms-be-very-afraid.aspx Accessed 01.06.08. Retrieved from
    • (2008) Virtualization Review
    • Wolf, C.1
  • 74
    • 85152344013 scopus 로고    scopus 로고
    • Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180, http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
  • 75
    • 85152321186 scopus 로고    scopus 로고
    • What files make up a virtual machine? http://www.vmware.com/support/ws55/doc/ws_learningfiles_in_a_vm.html
  • 76
    • 85152318133 scopus 로고    scopus 로고
    • Understanding virtual machine snapshots in VMware ESX. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180
  • 77
    • 85152306321 scopus 로고    scopus 로고
    • http://www.virtualizationdaily.com/archives/73_how-to-convert-a-vmware-virtual-appliance-to-work-with-parallels.html
  • 78
    • 85152322675 scopus 로고    scopus 로고
    • http://vmtoolkit.com/
  • 79
    • 85152322900 scopus 로고    scopus 로고
    • http://viethak.com/2009/11/27/Convert-VMDK-to-VHD-Virtual-Disk-or-Vice-versa-Using-StarWind-Image-Converter.html
  • 80
    • 84882436826 scopus 로고    scopus 로고
    • Retrieved from. Accessed 12.11.08
    • A. Barrett (2008) VMware makes the case for PCI DSS compliance. SearchServerVirtualization.com Retrieved from http://searchservervirtualization.techtarget.com/news/article/0,289142,sid94_gci1338681,00.html. Accessed 12.11.08
    • (2008) VMware makes the case for PCI DSS compliance
    • Barrett, A.1
  • 81
    • 74549210176 scopus 로고    scopus 로고
    • Computer forensic analysis in a virtual environment
    • Fall
    • D. Bem and E. Huebner (2007, Fall) Computer forensic analysis in a virtual environment. International Journal of Digital Evidence 6(2), www.ijde.org
    • (2007) International Journal of Digital Evidence , vol.6 , Issue.2
    • Bem, D.1    Huebner, E.2
  • 82
    • 84882304651 scopus 로고    scopus 로고
    • Automating D2D backup of virtual machines
    • Accessed 01.10.09, Retrevied from
    • J. Fegreus (2009) Automating D2D backup of virtual machines. InfoStor http://www.infostor.com/index/articles/display/articles/infostor/backup-and_recovery/disk-based-backup/lab-review__automating.html Accessed 01.10.09 Retrevied from
    • (2009) InfoStor
    • Fegreus, J.1
  • 83
    • 84882351470 scopus 로고    scopus 로고
    • How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization
    • Retrieved from
    • W. Hau, R. Araujo, V. Chudgar, R. Hustad and C. Chaubal (2009) How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization. VMware http://www.vmware.com/files/pdf/technology/mapping_pci_req_part1_wp.pdf Retrieved from
    • (2009) VMware
    • Hau, W.1    Araujo, R.2    Chudgar, V.3    Hustad, R.4    Chaubal, C.5
  • 84
    • 84882360006 scopus 로고    scopus 로고
    • How virtualization affects PCI DSS Part 2: a review of the top five issues
    • Retrieved from
    • W. Hau, R. Araujo, V. Chudgar, R. Hustad and C. Chaubal (2010) How virtualization affects PCI DSS Part 2: a review of the top five issues. VMware http://www.vmware.com/files/pdf/technology/review_top5_issues_wp.pdf Retrieved from
    • (2010) VMware
    • Hau, W.1    Araujo, R.2    Chudgar, V.3    Hustad, R.4    Chaubal, C.5
  • 85
    • 84882413365 scopus 로고    scopus 로고
    • Virtual machines you have to see them to manage them
    • Retrieved from
    • D. Kusnetzky (2007) Virtual machines you have to see them to manage them. Kusnetsky group http://www.virtual-strategy.com/Dan-Kusnetzky/Virtual-Machines-You-Have-to-See-Them-to-Manage-Them.html Retrieved from
    • (2007) Kusnetsky group
    • Kusnetzky, D.1
  • 86
    • 84882368297 scopus 로고    scopus 로고
    • Virtual machines can be an e-discovery nightmare
    • Retrieved from
    • R. Miller (2008) Virtual machines can be an e-discovery nightmare. Fierce Content Management http://www.fiercecontentmanagement.com/story/virtual-machines-can-be-e-discovery-nightmare/2008-09-11 Retrieved from
    • (2008) Fierce Content Management
    • Miller, R.1
  • 87
    • 84882443234 scopus 로고    scopus 로고
    • How to find virtual machines for greater virtualization compliance
    • Accessed 07.08.09, Retrieved from
    • D. Mortman (2009) How to find virtual machines for greater virtualization compliance. Information Security Magazine http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359272,00.html Accessed 07.08.09 Retrieved from
    • (2009) Information Security Magazine
    • Mortman, D.1
  • 88
    • 84882352427 scopus 로고    scopus 로고
    • Virtual machines pose e-discovery risk, vendor says
    • September 10, Retrieved from
    • P. Shread (2008, September 10) Virtual machines pose e-discovery risk, vendor says. EnterpriseStorageForum http://www.enterprisestorageforum.com/article.php/3770706 Retrieved from
    • (2008) EnterpriseStorageForum
    • Shread, P.1
  • 90
    • 85152341818 scopus 로고    scopus 로고
    • How Virtualization Affects EDD Collection (Law.com)
  • 91
    • 85152316336 scopus 로고    scopus 로고
    • Accessed 17.05.09.
    • VM Sprawl – prevention rather than cure. http://www.techworld.com/virtualisation/news/index.cfm?newsID=115876&pagtype Accessed 17.05.09
  • 93
    • 84882382641 scopus 로고    scopus 로고
    • Virtualization: Enough holes to work Vegas
    • Retrieved from
    • D.J. Capelis (2007) Virtualization: Enough holes to work Vegas. Defcon 15, Las Vegas http://www.dc414.org/download/confs/defcon15/Speakers/Capelis/dc-15-%20capelis.pdf Retrieved from
    • (2007) Defcon 15, Las Vegas
    • Capelis, D.J.1
  • 94
    • 84882329858 scopus 로고    scopus 로고
    • Hypervisor security concerns
    • Retrieved from
    • A. Cargile (2009) Hypervisor security concerns. The Coffee Desk http://thecoffeedesk.com/news/index.php/2009/12/01/hypervisor-security-concerns/ Retrieved from
    • (2009) The Coffee Desk
    • Cargile, A.1
  • 97
    • 38349023177 scopus 로고    scopus 로고
    • Attacks on more virtual machine emulators
    • Retrieved from
    • P. Ferrie (2007) Attacks on more virtual machine emulators. Symantic Advanced Threat Research www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf Retrieved from
    • (2007) Symantic Advanced Threat Research
    • Ferrie, P.1
  • 98
    • 85152349478 scopus 로고    scopus 로고
    • Retrieved from
    • video Hankeln (2008) http://sanbarrow.com/latest-videoesxi-exe.html Retrieved from
    • (2008)
    • video Hankeln1
  • 100
    • 84893734563 scopus 로고    scopus 로고
    • On the cutting edge: Thwarting virtual machine
    • Retrieved from
    • T. Liston and E. Skoudis (2006) On the cutting edge: Thwarting virtual machine. IntelGuardians http://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf Retrieved from
    • (2006) IntelGuardians
    • Liston, T.1    Skoudis, E.2
  • 101
    • 84882309908 scopus 로고    scopus 로고
    • Data recovery and information about solid state devices and NAND flash memory
    • August
    • S. Moulton (2008, August) Data recovery and information about solid state devices and NAND flash memory. Video posted to www.youtube.com/view_play_list?p=C337FACBF12BDCE2
    • (2008) Video posted to
    • Moulton, S.1
  • 103
    • 85152315455 scopus 로고    scopus 로고
    • How to steal a virtual machine and its data in 3 easy steps.
    • Retrieved from, (2010, January 7)
    • Siebert, E. (2010, January 7). How to steal a virtual machine and its data in 3 easy steps. SearchVMware.com. Retrieved from http://searchvmware.techtarget.com/news/article/0,289142,sid179_gci1378347,00.html
    • SearchVMware.com.
    • Siebert, E.1
  • 104
    • 85152341025 scopus 로고    scopus 로고
    • Retrieved from
    • STIG Security Technical Implementation Guides (2001) Information Assurance Support Environment. http://iase.disa.mil/stigs/stig/index.html Retrieved from
    • (2001) Information Assurance Support Environment
  • 105
    • 85152310747 scopus 로고    scopus 로고
    • Breaking down the vStorage Virtual Machine File System (VMFS).
    • Retrieved from
    • Vanover, R. (2010). Breaking down the vStorage Virtual Machine File System (VMFS). SearchVMware.com. Retrieved from http://searchvmware.techtarget.com/tip/0,289483,sid179_gci1368383_mem1,00.html
    • (2010) SearchVMware.com.
    • Vanover, R.1
  • 108
    • 85152343424 scopus 로고    scopus 로고
    • Install and Configure ESX server http://virtualizationinformation.com/docs/Notes%20on%20VI%203.pdf
  • 109
    • 85152343970 scopus 로고    scopus 로고
    • Defragmenting virtual machine files http://itknowledgeexchange.techtarget.com/virtualization-pro/defragmenting-virtual-machine-disk-files/
  • 113
    • 85152346274 scopus 로고    scopus 로고
    • Network segmentation in virtualized environments.
    • Network segmentation in virtualized environments. VMware white paper. http://www.vmware.com/files/pdf/network_segmentation.pdf
    • VMware white paper.
  • 115
    • 84882343450 scopus 로고    scopus 로고
    • Cloud computing deep dive
    • September
    • M. Beckman (2009, September) Cloud computing deep dive. InfoWorld
    • (2009) InfoWorld
    • Beckman, M.1
  • 116
    • 84882434493 scopus 로고    scopus 로고
    • Cloud computing and network forensics in the eyes of computer forensic examiner
    • 02/
    • S. Amoah (02/2010) Cloud computing and network forensics in the eyes of computer forensic examiner. Decision Group
    • (2010) Decision Group
    • Amoah, S.1
  • 118
    • 68649086619 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • December
    • Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance
    • (2009) Cloud Security Alliance
  • 120
    • 84882420674 scopus 로고    scopus 로고
    • The future of virtualization: a view from the front lines
    • May 6, Retrieved from
    • J. Stokes (2009, May 6) The future of virtualization: a view from the front lines. ars technica http://arstechnica.com/business/news/2009/05/the-future-of-virtualization-a-view-from-the-front-lines.ars Retrieved from
    • (2009) ars technica
    • Stokes, J.1
  • 121
    • 84882335791 scopus 로고    scopus 로고
    • Virtualization goes mobile
    • April 9, Retrieved from
    • O. Kharif (2008, April 9) Virtualization goes mobile. BusinessWeek Online http://www.businessweek.com/technology/content/apr2008/tc20080421_235517.htm?chan=technology_technology%2Bindex%2Bpage_top%2Bst Retrieved from
    • (2008) BusinessWeek Online
    • Kharif, O.1
  • 122
    • 85152344638 scopus 로고    scopus 로고
    • (n.d.). Retrieved from
    • VMWare Mobile Virtualization Platform http://www.vmware.com/products/mobile/ (n.d.). Retrieved from
  • 123
    • 84882290509 scopus 로고    scopus 로고
    • October 23, Retrieved from
    • J. Tozzi (2009, October 23) The rise of the Homepreneur. http://www.businessweek.com/smallbiz/content/oct2009/sb20091023_263258.htm Retrieved from
    • (2009) The rise of the Homepreneur
    • Tozzi, J.1
  • 124
    • 84882310817 scopus 로고    scopus 로고
    • Mobile phone virtualization to really enable workers and IT staff
    • September 4, Retrieved from
    • NetworkWorld Asia Staff (2009, September 4) Mobile phone virtualization to really enable workers and IT staff. NetworkWorldAsia http://www.networksasia.net/content/mobile-phone-virtualization-really-enable-workers-and-it-staff Retrieved from
    • (2009) NetworkWorldAsia
  • 126
    • 84882384449 scopus 로고    scopus 로고
    • February 4, Retrieved from
    • R. Mark (2010, February 4) House Passes Cyber-Security Act. eWeek.com http://www.eweek.com/c/a/Government-IT/House-Passes-Cybersecurity-Act-682741/ Retrieved from
    • (2010) House Passes Cyber-Security Act
    • Mark, R.1
  • 127
    • 83055189175 scopus 로고    scopus 로고
    • Gartner: Brace yourself for cloud computing
    • October 20, Retrieved from
    • S. Shankland (2009, October 20) Gartner: Brace yourself for cloud computing. CNET news http://news.cnet.com/8301-30685_3-10378782-264.html Retrieved from
    • (2009) CNET news
    • Shankland, S.1
  • 128
  • 129
    • 84882300055 scopus 로고    scopus 로고
    • How autonomic computing will reshape IT
    • October 15, Retrieved from
    • P. Horn (2001, October 15) How autonomic computing will reshape IT. CNET news http://news.cnet.com/2010-1071-281578.html Retrieved from
    • (2001) CNET news
    • Horn, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.