-
2
-
-
84882368610
-
Gartner: CIOs look to lighter-weight, social technologies to transform IT
-
January 20, Retrieved from
-
D. Dubie (2010, January 20) Gartner: CIOs look to lighter-weight, social technologies to transform IT. Network World http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it?eid=-1533 Retrieved from
-
(2010)
Network World
-
-
Dubie, D.1
-
4
-
-
84882292575
-
Emerging technology analysis: hosted virtual desktops
-
February 17, Retrieved from
-
B. Gammage and A. Jump (2009, February 17) Emerging technology analysis: hosted virtual desktops. Gartner group http://www.gartner.com/DisplayDocument?ref=g_search&id=887912&subref=simplesearch Retrieved from
-
(2009)
Gartner group
-
-
Gammage, B.1
Jump, A.2
-
5
-
-
84944386303
-
When virtual is harder than real: security challenges in virtual machine based computing environments
-
June 12–15. Santa Fe, NM.
-
T. Garfinkel and M. Rosenblum (2005) When virtual is harder than real: security challenges in virtual machine based computing environments. Proceedings of the 10th Workshop on Hot Topics in Operating Systems June 12–15. Santa Fe, NM
-
(2005)
Proceedings of the 10th Workshop on Hot Topics in Operating Systems
-
-
Garfinkel, T.1
Rosenblum, M.2
-
6
-
-
84882391896
-
Gartner predicts nearly half of server workloads will be virtualized
-
October 20, Retrieved from
-
E. Messmer (2009, October 20) Gartner predicts nearly half of server workloads will be virtualized. Network World http://www.networkworld.com/news/2009/102009-gartner-server-virtualization.html Retrieved from
-
(2009)
Network World
-
-
Messmer, E.1
-
8
-
-
84882401287
-
Rise of the virtual machine
-
February, Retrieved from
-
E. Orakwue (2009, February) Rise of the virtual machine. ISSA Journal http://www.issa.org/Library/Journals/2009/February/Orakwue-Rise%20of%20the%20Virtual%20Machine.pdf Retrieved from
-
(2009)
ISSA Journal
-
-
Orakwue, E.1
-
9
-
-
84882333970
-
-
Retrieved from
-
Paravirtualization API version 2.5. Copyright 2005, 2006. VMware, Inc. www.vmware.com/pdf/vmi_specs.pdf Retrieved from
-
Copyright 2005, 2006. VMware, Inc
-
-
-
12
-
-
85152333760
-
-
January), Volume 18., Retrieved from
-
Virtual Data Center E-Zine, (2010, January), Volume 18. Retrieved from http://searchdatacenter.techtarget.com/generic/0,295582,sid80_gci1313630,00.html
-
(2010)
-
-
-
13
-
-
85152334651
-
-
www.scribd.com/doc/17770659/VirtualizationReport-for-Seminar
-
-
-
-
14
-
-
85152346859
-
-
http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it?eid=-1533
-
-
-
-
15
-
-
85152319974
-
-
http://www.gartner.com/DisplayDocument?id=5651
-
-
-
-
16
-
-
85152304307
-
-
www.wmware.com
-
-
-
-
17
-
-
85152350679
-
-
www.parallels.com
-
-
-
-
18
-
-
85152314071
-
-
http://www.microsoft.com/windows/virtual-pc/
-
-
-
-
19
-
-
85152353240
-
-
http://www.virtualbox.org/manual/UserManual.html
-
-
-
-
20
-
-
85152325576
-
-
http://www.xen.org/support/documentation.html
-
-
-
-
21
-
-
84882396542
-
Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan
-
November 30, Retrieved from
-
Frost and Sullivan (2009, November 30) Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan. Frost & Sullivan http://www.frost.com/prod/servlet/press-release.pag?docid=185829213 Retrieved from
-
(2009)
Frost & Sullivan
-
-
-
22
-
-
84882300377
-
Virtualization and virtual machine software. We help you to choose the best VM
-
June
-
D. Kusnetzky (2007, June) Virtualization and virtual machine software. We help you to choose the best VM. Hacking IT Security Magazine
-
(2007)
Hacking IT Security Magazine
-
-
Kusnetzky, D.1
-
24
-
-
84882331775
-
What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions
-
March, Retrieved from
-
Y. Suzuki and M. Moriyama (2006, March) What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions. Techrepublic.com http://whitepapers.techrepublic.com.com/abstract.aspx?docid=344989 Retrieved from
-
(2006)
Techrepublic.com
-
-
Suzuki, Y.1
Moriyama, M.2
-
25
-
-
84882354364
-
SAN-based storage virtualization: five benefits for your customers
-
October 10, Retrieved from
-
B. Peterson (2007, October 10) SAN-based storage virtualization: five benefits for your customers. Search Storage Channel.com http://searchstoragechannel.techtarget.com/tip/0,289483,sid98_gci1274842,00.html Retrieved from
-
(2007)
Search Storage Channel.com
-
-
Peterson, B.1
-
26
-
-
84882442227
-
10 key differences between desktop and server virtualization deployments
-
November 23, Retrieved from
-
C. Preimesberger (2009, November 23) 10 key differences between desktop and server virtualization deployments. eWeek.com http://www.eweek.com/c/a/Data-Storage/10-Key-Differences-Between-Desktop-and-Server-Virtualization-Deployments-152781/ Retrieved from
-
(2009)
eWeek.com
-
-
Preimesberger, C.1
-
28
-
-
85152337540
-
-
www.wmware.com
-
-
-
-
29
-
-
85152346377
-
-
www.wmware.com
-
-
-
-
30
-
-
85152325798
-
-
www.parallels.com
-
-
-
-
31
-
-
85152335771
-
-
http://www.microsoft.com/windows/virtual-pc/
-
-
-
-
32
-
-
85152350141
-
-
http://www.virtualbox.org/manual/UserManual.html
-
-
-
-
33
-
-
85152336278
-
-
http://www.xen.org/support/documentation.html
-
-
-
-
34
-
-
85152353685
-
-
http://www.linux-forensics.com/
-
-
-
-
35
-
-
85152332775
-
-
http://www.vmware.com/appliances/directory/213673
-
-
-
-
36
-
-
85152322518
-
-
http://www.vmware.com/appliances/directory/813
-
-
-
-
37
-
-
85152347881
-
-
http://www.e-fense.com/helix3pro
-
-
-
-
38
-
-
85152307248
-
-
http://www.vmware.com/appliances/directory/57815
-
-
-
-
39
-
-
85152331171
-
-
http://www.caine-live.net/
-
-
-
-
41
-
-
84882432812
-
Parallels virtuozzo containers offers 350 templates
-
Retrieved from
-
D. Marshall (2008) Parallels virtuozzo containers offers 350 templates. InfoWorld virtualization report Retrieved from http://weblog.infoworld.com/virtualization/archives/2008/02/parallels_virtu.html
-
(2008)
InfoWorld virtualization report
-
-
Marshall, D.1
-
43
-
-
85152319449
-
-
RingCube MojoPac
-
http://www.mojopac.com/enterprise/products/index.html RingCube MojoPac
-
-
-
-
44
-
-
85152317853
-
-
Moka5.
-
http://www.moka5.com/products/index.html LivePCs. Moka5
-
LivePCs.
-
-
-
45
-
-
84882365909
-
Cool vendors in PC technologies, 2007
-
Retrieved from
-
L. Fiering, M.A. Silver, B. Gammage, J. Unsworth and D.M. Smith (2007) Cool vendors in PC technologies, 2007. Gartner, Inc www.gartner.com/DisplayDocument?id=502005 Retrieved from
-
(2007)
Gartner, Inc
-
-
Fiering, L.1
Silver, M.A.2
Gammage, B.3
Unsworth, J.4
Smith, D.M.5
-
48
-
-
85152315937
-
-
www.wmware.com
-
-
-
-
49
-
-
85152304508
-
-
www.parallels.com
-
-
-
-
50
-
-
85152323976
-
-
http://www.xen.org/support/documentation.html
-
-
-
-
53
-
-
85152321647
-
-
http://www.vmware.com/appliances/getting-started/learn/faq.html
-
-
-
-
54
-
-
84882336484
-
-
MetroPipe
-
The free portable privacy machine. http://www.metropipe.net/ppm.php?SID=4e38766ea6a3fab4792ced91b2bdbe48 MetroPipe
-
The free portable privacy machine
-
-
-
55
-
-
70350043605
-
Hiding in a virtual world using unconventionally installed operating systems.
-
Dallas, TX., Retrieved from
-
Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326%26authDecision=-203
-
(2009)
IEEE International Conference on Intelligence and Security Informatics.
-
-
Bares, R.1
-
56
-
-
79952337297
-
-
Retrieved from
-
Microsoft Corporation (2009) Virtual hard disk image format specification download.microsoft.com/.../Virtual%20Hard%20Disk%20Format%20Spec_10_18_06.doc Retrieved from
-
(2009)
Virtual hard disk image format specification
-
-
-
57
-
-
33847308562
-
Tackling the U3 trend with computer forensics
-
Retrieved from
-
A. Spruill and C. Pavan (2007) Tackling the U3 trend with computer forensics. Journal of Digital Investigation 4(1), http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B7CW4-4N440CB-1&_user=8303832&_coverDate=03%2F31%2F2007&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1285052568&_rerunOrigin=google&_acct=C000000593&_version=1&_urlVersion=0&_userid=8303832&md5=a1cb63ae1f78f6b950cc2a28c540f4ed Retrieved from
-
(2007)
Journal of Digital Investigation
, vol.4
, Issue.1
-
-
Spruill, A.1
Pavan, C.2
-
60
-
-
70350043605
-
Hiding in a virtual world using unconventionally installed operating systems.
-
Dallas, TX., Retrieved from
-
Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326&authDecision=-203
-
(2009)
IEEE International Conference on Intelligence and Security Informatics.
-
-
Bares, R.1
-
61
-
-
84882425555
-
Ghost in the machine: Forensic evidence collection in the virtual environment
-
E.M. Fiterman and J.D. Durick (2010) Ghost in the machine: Forensic evidence collection in the virtual environment. Digital Forensics Magazine 2 73-77
-
(2010)
Digital Forensics Magazine
, vol.2
, pp. 73-77
-
-
Fiterman, E.M.1
Durick, J.D.2
-
62
-
-
85152303227
-
How to examine the compromised Microsoft Virtual Server 2005 host server after a security breach.
-
Retrieved from, (2007, February 20)
-
Stagner, H. (2007, February 20). How to examine the compromised Microsoft Virtual Server 2005 host server after a security breach. SearchServerVirtualization.com. Retrieved from http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html
-
SearchServerVirtualization.com.
-
-
Stagner, H.1
-
63
-
-
85152336777
-
-
VMware GSX server documentation http://www.vmware.com/support/gsx25/doc/performance_memory_reserved_gsx.html
-
-
-
-
64
-
-
85152331940
-
-
VMware patents applied for http://www.patentstorm.us/attorney-applications/VMware__Inc_/241723/1.html
-
-
-
-
65
-
-
85152324724
-
-
http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html
-
-
-
-
67
-
-
38349023177
-
Attacks on more virtual machine emulators
-
Retrieved from
-
P. Ferrie (2007) Attacks on more virtual machine emulators. Symantic Advanced Threat Research www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf Retrieved from
-
(2007)
Symantic Advanced Threat Research
-
-
Ferrie, P.1
-
68
-
-
84960376125
-
-
September 2008, Updated November, Retrieved from
-
H. Parsonage (September 2008, Updated November 2009) The meaning of linkfiles in forensic examinations http://computerforensics.parsonage.co.uk/downloads/TheMeaningofLIFE.pdf Retrieved from
-
(2009)
The meaning of linkfiles in forensic examinations
-
-
Parsonage, H.1
-
69
-
-
84898096655
-
Virtual machine forensics, a discussion of virtual machines related to forensics analysis
-
Retrieved from
-
B. Shavers (2008) Virtual machine forensics, a discussion of virtual machines related to forensics analysis. Forensic Focus http://www.forensicfocus.com Retrieved from
-
(2008)
Forensic Focus
-
-
Shavers, B.1
-
70
-
-
85152337535
-
How to detect rogue virtual machines on a network.
-
Retrieved from, Contributor, Accessed 14.03.07.
-
Stagner, H. (2007). How to detect rogue virtual machines on a network. SearchServerVirtualization.com. Retrieved from http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1247530_mem1,00.html. Contributor Accessed 14.03.07
-
(2007)
SearchServerVirtualization.com.
-
-
Stagner, H.1
-
71
-
-
84882316038
-
Evidentiary value of link files
-
Retrieved from
-
N. Weilbacher (2006) Evidentiary value of link files. Forensic Focus http://www.forensicfocus.com/link-file-evidentiary-value Retrieved from
-
(2006)
Forensic Focus
-
-
Weilbacher, N.1
-
72
-
-
84882393405
-
Inventorying virtual hard disk files on a server or domain
-
Retrieved from
-
C. Wolf (2007) Inventorying virtual hard disk files on a server or domain. Virtualization Review http://virtualizationreview.com/articles/2007/05/01/inventorying-virtualhard-disk-files-on-a-server-or-domain.aspx Retrieved from
-
(2007)
Virtualization Review
-
-
Wolf, C.1
-
73
-
-
84882437914
-
Rogue VMs be very afraid
-
Accessed 01.06.08., Retrieved from
-
C. Wolf (2008) Rogue VMs be very afraid. Virtualization Review http://virtualizationreview.com/articles/2008/06/01/rogue-vms-be-very-afraid.aspx Accessed 01.06.08. Retrieved from
-
(2008)
Virtualization Review
-
-
Wolf, C.1
-
74
-
-
85152344013
-
-
Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180, http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
-
-
-
-
75
-
-
85152321186
-
-
What files make up a virtual machine? http://www.vmware.com/support/ws55/doc/ws_learningfiles_in_a_vm.html
-
-
-
-
76
-
-
85152318133
-
-
Understanding virtual machine snapshots in VMware ESX. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180
-
-
-
-
77
-
-
85152306321
-
-
http://www.virtualizationdaily.com/archives/73_how-to-convert-a-vmware-virtual-appliance-to-work-with-parallels.html
-
-
-
-
78
-
-
85152322675
-
-
http://vmtoolkit.com/
-
-
-
-
79
-
-
85152322900
-
-
http://viethak.com/2009/11/27/Convert-VMDK-to-VHD-Virtual-Disk-or-Vice-versa-Using-StarWind-Image-Converter.html
-
-
-
-
80
-
-
84882436826
-
-
Retrieved from. Accessed 12.11.08
-
A. Barrett (2008) VMware makes the case for PCI DSS compliance. SearchServerVirtualization.com Retrieved from http://searchservervirtualization.techtarget.com/news/article/0,289142,sid94_gci1338681,00.html. Accessed 12.11.08
-
(2008)
VMware makes the case for PCI DSS compliance
-
-
Barrett, A.1
-
81
-
-
74549210176
-
Computer forensic analysis in a virtual environment
-
Fall
-
D. Bem and E. Huebner (2007, Fall) Computer forensic analysis in a virtual environment. International Journal of Digital Evidence 6(2), www.ijde.org
-
(2007)
International Journal of Digital Evidence
, vol.6
, Issue.2
-
-
Bem, D.1
Huebner, E.2
-
82
-
-
84882304651
-
Automating D2D backup of virtual machines
-
Accessed 01.10.09, Retrevied from
-
J. Fegreus (2009) Automating D2D backup of virtual machines. InfoStor http://www.infostor.com/index/articles/display/articles/infostor/backup-and_recovery/disk-based-backup/lab-review__automating.html Accessed 01.10.09 Retrevied from
-
(2009)
InfoStor
-
-
Fegreus, J.1
-
83
-
-
84882351470
-
How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization
-
Retrieved from
-
W. Hau, R. Araujo, V. Chudgar, R. Hustad and C. Chaubal (2009) How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization. VMware http://www.vmware.com/files/pdf/technology/mapping_pci_req_part1_wp.pdf Retrieved from
-
(2009)
VMware
-
-
Hau, W.1
Araujo, R.2
Chudgar, V.3
Hustad, R.4
Chaubal, C.5
-
84
-
-
84882360006
-
How virtualization affects PCI DSS Part 2: a review of the top five issues
-
Retrieved from
-
W. Hau, R. Araujo, V. Chudgar, R. Hustad and C. Chaubal (2010) How virtualization affects PCI DSS Part 2: a review of the top five issues. VMware http://www.vmware.com/files/pdf/technology/review_top5_issues_wp.pdf Retrieved from
-
(2010)
VMware
-
-
Hau, W.1
Araujo, R.2
Chudgar, V.3
Hustad, R.4
Chaubal, C.5
-
85
-
-
84882413365
-
Virtual machines you have to see them to manage them
-
Retrieved from
-
D. Kusnetzky (2007) Virtual machines you have to see them to manage them. Kusnetsky group http://www.virtual-strategy.com/Dan-Kusnetzky/Virtual-Machines-You-Have-to-See-Them-to-Manage-Them.html Retrieved from
-
(2007)
Kusnetsky group
-
-
Kusnetzky, D.1
-
86
-
-
84882368297
-
Virtual machines can be an e-discovery nightmare
-
Retrieved from
-
R. Miller (2008) Virtual machines can be an e-discovery nightmare. Fierce Content Management http://www.fiercecontentmanagement.com/story/virtual-machines-can-be-e-discovery-nightmare/2008-09-11 Retrieved from
-
(2008)
Fierce Content Management
-
-
Miller, R.1
-
87
-
-
84882443234
-
How to find virtual machines for greater virtualization compliance
-
Accessed 07.08.09, Retrieved from
-
D. Mortman (2009) How to find virtual machines for greater virtualization compliance. Information Security Magazine http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359272,00.html Accessed 07.08.09 Retrieved from
-
(2009)
Information Security Magazine
-
-
Mortman, D.1
-
88
-
-
84882352427
-
Virtual machines pose e-discovery risk, vendor says
-
September 10, Retrieved from
-
P. Shread (2008, September 10) Virtual machines pose e-discovery risk, vendor says. EnterpriseStorageForum http://www.enterprisestorageforum.com/article.php/3770706 Retrieved from
-
(2008)
EnterpriseStorageForum
-
-
Shread, P.1
-
90
-
-
85152341818
-
-
How Virtualization Affects EDD Collection (Law.com)
-
-
-
-
91
-
-
85152316336
-
-
Accessed 17.05.09.
-
VM Sprawl – prevention rather than cure. http://www.techworld.com/virtualisation/news/index.cfm?newsID=115876&pagtype Accessed 17.05.09
-
-
-
-
93
-
-
84882382641
-
Virtualization: Enough holes to work Vegas
-
Retrieved from
-
D.J. Capelis (2007) Virtualization: Enough holes to work Vegas. Defcon 15, Las Vegas http://www.dc414.org/download/confs/defcon15/Speakers/Capelis/dc-15-%20capelis.pdf Retrieved from
-
(2007)
Defcon 15, Las Vegas
-
-
Capelis, D.J.1
-
94
-
-
84882329858
-
Hypervisor security concerns
-
Retrieved from
-
A. Cargile (2009) Hypervisor security concerns. The Coffee Desk http://thecoffeedesk.com/news/index.php/2009/12/01/hypervisor-security-concerns/ Retrieved from
-
(2009)
The Coffee Desk
-
-
Cargile, A.1
-
97
-
-
38349023177
-
Attacks on more virtual machine emulators
-
Retrieved from
-
P. Ferrie (2007) Attacks on more virtual machine emulators. Symantic Advanced Threat Research www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf Retrieved from
-
(2007)
Symantic Advanced Threat Research
-
-
Ferrie, P.1
-
98
-
-
85152349478
-
-
Retrieved from
-
video Hankeln (2008) http://sanbarrow.com/latest-videoesxi-exe.html Retrieved from
-
(2008)
-
-
video Hankeln1
-
99
-
-
34249852320
-
-
Retrieved from
-
S.T. King, P.M. Chen, Y.-M. Wang, C. Verbowski, H.J. Wang and J.R. Lorch (2006) SubVirt: implementing malware with virtual machines. http://portal.acm.org/citation.cfm?id=1130383 Retrieved from
-
(2006)
SubVirt: implementing malware with virtual machines
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
100
-
-
84893734563
-
On the cutting edge: Thwarting virtual machine
-
Retrieved from
-
T. Liston and E. Skoudis (2006) On the cutting edge: Thwarting virtual machine. IntelGuardians http://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf Retrieved from
-
(2006)
IntelGuardians
-
-
Liston, T.1
Skoudis, E.2
-
101
-
-
84882309908
-
Data recovery and information about solid state devices and NAND flash memory
-
August
-
S. Moulton (2008, August) Data recovery and information about solid state devices and NAND flash memory. Video posted to www.youtube.com/view_play_list?p=C337FACBF12BDCE2
-
(2008)
Video posted to
-
-
Moulton, S.1
-
103
-
-
85152315455
-
How to steal a virtual machine and its data in 3 easy steps.
-
Retrieved from, (2010, January 7)
-
Siebert, E. (2010, January 7). How to steal a virtual machine and its data in 3 easy steps. SearchVMware.com. Retrieved from http://searchvmware.techtarget.com/news/article/0,289142,sid179_gci1378347,00.html
-
SearchVMware.com.
-
-
Siebert, E.1
-
104
-
-
85152341025
-
-
Retrieved from
-
STIG Security Technical Implementation Guides (2001) Information Assurance Support Environment. http://iase.disa.mil/stigs/stig/index.html Retrieved from
-
(2001)
Information Assurance Support Environment
-
-
-
105
-
-
85152310747
-
Breaking down the vStorage Virtual Machine File System (VMFS).
-
Retrieved from
-
Vanover, R. (2010). Breaking down the vStorage Virtual Machine File System (VMFS). SearchVMware.com. Retrieved from http://searchvmware.techtarget.com/tip/0,289483,sid179_gci1368383_mem1,00.html
-
(2010)
SearchVMware.com.
-
-
Vanover, R.1
-
108
-
-
85152343424
-
-
Install and Configure ESX server http://virtualizationinformation.com/docs/Notes%20on%20VI%203.pdf
-
-
-
-
109
-
-
85152343970
-
-
Defragmenting virtual machine files http://itknowledgeexchange.techtarget.com/virtualization-pro/defragmenting-virtual-machine-disk-files/
-
-
-
-
113
-
-
85152346274
-
Network segmentation in virtualized environments.
-
Network segmentation in virtualized environments. VMware white paper. http://www.vmware.com/files/pdf/network_segmentation.pdf
-
VMware white paper.
-
-
-
115
-
-
84882343450
-
Cloud computing deep dive
-
September
-
M. Beckman (2009, September) Cloud computing deep dive. InfoWorld
-
(2009)
InfoWorld
-
-
Beckman, M.1
-
116
-
-
84882434493
-
Cloud computing and network forensics in the eyes of computer forensic examiner
-
02/
-
S. Amoah (02/2010) Cloud computing and network forensics in the eyes of computer forensic examiner. Decision Group
-
(2010)
Decision Group
-
-
Amoah, S.1
-
118
-
-
68649086619
-
Security guidance for critical areas of focus in cloud computing
-
December
-
Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance
-
(2009)
Cloud Security Alliance
-
-
-
120
-
-
84882420674
-
The future of virtualization: a view from the front lines
-
May 6, Retrieved from
-
J. Stokes (2009, May 6) The future of virtualization: a view from the front lines. ars technica http://arstechnica.com/business/news/2009/05/the-future-of-virtualization-a-view-from-the-front-lines.ars Retrieved from
-
(2009)
ars technica
-
-
Stokes, J.1
-
121
-
-
84882335791
-
Virtualization goes mobile
-
April 9, Retrieved from
-
O. Kharif (2008, April 9) Virtualization goes mobile. BusinessWeek Online http://www.businessweek.com/technology/content/apr2008/tc20080421_235517.htm?chan=technology_technology%2Bindex%2Bpage_top%2Bst Retrieved from
-
(2008)
BusinessWeek Online
-
-
Kharif, O.1
-
122
-
-
85152344638
-
-
(n.d.). Retrieved from
-
VMWare Mobile Virtualization Platform http://www.vmware.com/products/mobile/ (n.d.). Retrieved from
-
-
-
-
123
-
-
84882290509
-
-
October 23, Retrieved from
-
J. Tozzi (2009, October 23) The rise of the Homepreneur. http://www.businessweek.com/smallbiz/content/oct2009/sb20091023_263258.htm Retrieved from
-
(2009)
The rise of the Homepreneur
-
-
Tozzi, J.1
-
124
-
-
84882310817
-
Mobile phone virtualization to really enable workers and IT staff
-
September 4, Retrieved from
-
NetworkWorld Asia Staff (2009, September 4) Mobile phone virtualization to really enable workers and IT staff. NetworkWorldAsia http://www.networksasia.net/content/mobile-phone-virtualization-really-enable-workers-and-it-staff Retrieved from
-
(2009)
NetworkWorldAsia
-
-
-
126
-
-
84882384449
-
-
February 4, Retrieved from
-
R. Mark (2010, February 4) House Passes Cyber-Security Act. eWeek.com http://www.eweek.com/c/a/Government-IT/House-Passes-Cybersecurity-Act-682741/ Retrieved from
-
(2010)
House Passes Cyber-Security Act
-
-
Mark, R.1
-
127
-
-
83055189175
-
Gartner: Brace yourself for cloud computing
-
October 20, Retrieved from
-
S. Shankland (2009, October 20) Gartner: Brace yourself for cloud computing. CNET news http://news.cnet.com/8301-30685_3-10378782-264.html Retrieved from
-
(2009)
CNET news
-
-
Shankland, S.1
-
128
-
-
7744244490
-
-
June, Retrieved from
-
IBM (2005, June) An architectural blueprint for autonomic computing. http://www-03.ibm.com/autonomic/pdfs/AC%20Blueprint%20White%20Paper%20V7.pdf Retrieved from
-
(2005)
An architectural blueprint for autonomic computing
-
-
-
129
-
-
84882300055
-
How autonomic computing will reshape IT
-
October 15, Retrieved from
-
P. Horn (2001, October 15) How autonomic computing will reshape IT. CNET news http://news.cnet.com/2010-1071-281578.html Retrieved from
-
(2001)
CNET news
-
-
Horn, P.1
|