-
2
-
-
84882368610
-
Gartner: CIOs look to lighter-weight, social technologies to transform IT
-
January 20
-
Dubie D. Gartner: CIOs look to lighter-weight, social technologies to transform IT. Network World 2010, January 20, Retrieved from. http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it%3Feid=-1533.
-
(2010)
Network World
-
-
Dubie, D.1
-
4
-
-
84882292575
-
Emerging technology analysis: hosted virtual desktops
-
February 17
-
Gammage B., Jump A. Emerging technology analysis: hosted virtual desktops. Gartner group 2009, February 17, Retrieved from. http://www.gartner.com/DisplayDocument%3Fref=g_search%26id=887912%26subref=simplesearch.
-
(2009)
Gartner group
-
-
Gammage, B.1
Jump, A.2
-
6
-
-
84882391896
-
Gartner predicts nearly half of server workloads will be virtualized
-
October 20
-
Messmer E. Gartner predicts nearly half of server workloads will be virtualized. Network World 2009, October 20, Retrieved from. http://www.networkworld.com/news/2009/102009-gartner-server-virtualization.html.
-
(2009)
Network World
-
-
Messmer, E.1
-
8
-
-
84882401287
-
Rise of the virtual machine
-
February
-
Orakwue E. Rise of the virtual machine. ISSA Journal 2009, February, Retrieved from. http://www.issa.org/Library/Journals/2009/February/Orakwue-Rise%20of%20the%20Virtual%20Machine.pdf.
-
(2009)
ISSA Journal
-
-
Orakwue, E.1
-
9
-
-
84882333970
-
-
Paravirtualization API version 2.5., Retrieved from
-
Copyright 2005, 2006. VMware, Inc Paravirtualization API version 2.5., Retrieved from. http://www.vmware.com/pdf/vmi_specs.pdf.
-
Copyright 2005, 2006. VMware, Inc
-
-
-
10
-
-
84882352292
-
-
(n.d.) Formal requirements for virtualizable third generation architectures. Los Angeles: University of California, Honeywell Information Systems and Harvard University.
-
Popek, G. J., & Goldberg, R. P. (n.d.) Formal requirements for virtualizable third generation architectures. Los Angeles: University of California, Honeywell Information Systems and Harvard University.
-
-
-
Popek, G.J.1
Goldberg, R.P.2
-
11
-
-
84882397946
-
-
VMWare, Inc. (n.d.). Understanding full virtualization, paravirtualization, and hardware assist. Retrieved from
-
VMWare, Inc. (n.d.). Understanding full virtualization, paravirtualization, and hardware assist. Retrieved from. http://www.vmware.com/files/pdf/VMware_paravirtualization.pdf.
-
-
-
-
12
-
-
84882414578
-
-
Virtual Data Center E-Zine, (2010, January),. Retrieved from
-
Virtual Data Center E-Zine, (2010, January), Volume 18. Retrieved from. http://searchdatacenter.techtarget.com/generic/0,295582,sid80_gci1313630,00.html.
-
, vol.18
-
-
-
13
-
-
84882293298
-
-
http://www.scribd.com/doc/17770659/VirtualizationReport-for-Seminar.
-
-
-
-
14
-
-
84882430684
-
-
http://www.cio.com.au/article/333035/gartner_cios_look_lighter-weight_social_technologies_transform_it%3Feid=-1533.
-
-
-
-
15
-
-
84882327217
-
-
http://www.gartner.com/DisplayDocument%3Fid=5651.
-
-
-
-
16
-
-
84882362917
-
-
http://www.wmware.com.
-
-
-
-
17
-
-
84882402754
-
-
http://www.parallels.com.
-
-
-
-
18
-
-
84882354117
-
-
http://www.microsoft.com/windows/virtual-pc/.
-
-
-
-
19
-
-
84882390070
-
-
http://www.virtualbox.org/manual/UserManual.html.
-
-
-
-
20
-
-
84882328814
-
-
http://www.xen.org/support/documentation.html.
-
-
-
-
21
-
-
84882396542
-
Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan
-
November 30
-
Frost, Sullivan Although in its nascent stage, the future of virtualization market in India looks promising, notes Frost & Sullivan. Frost & Sullivan 2009, November 30, Retrieved from. http://www.frost.com/prod/servlet/press-release.pag%3Fdocid=185829213.
-
(2009)
Frost & Sullivan
-
-
Frost, S.1
-
22
-
-
84882300377
-
Virtualization and virtual machine software. We help you to choose the best VM
-
June
-
Kusnetzky D. Virtualization and virtual machine software. We help you to choose the best VM. Hacking IT Security Magazine 2007, June.
-
(2007)
Hacking IT Security Magazine
-
-
Kusnetzky, D.1
-
24
-
-
84882331775
-
What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions
-
March
-
Suzuki Y., Moriyama M. What issues does storage virtualization solve? The benefits of Hitachi's virtualization solutions. Techrepublic.com 2006, March, Retrieved from. http://whitepapers.techrepublic.com.com/abstract.aspx?docid=344989.
-
(2006)
Techrepublic.com
-
-
Suzuki, Y.1
Moriyama, M.2
-
25
-
-
84882354364
-
SAN-based storage virtualization: five benefits for your customers
-
October 10
-
Peterson B. SAN-based storage virtualization: five benefits for your customers. Search Storage Channel.com 2007, October 10, Retrieved from. http://searchstoragechannel.techtarget.com/tip/0,289483,sid98_gci1274842,00.html.
-
(2007)
Search Storage Channel.com
-
-
Peterson, B.1
-
26
-
-
84882442227
-
10 key differences between desktop and server virtualization deployments
-
November 23
-
Preimesberger C. 10 key differences between desktop and server virtualization deployments. eWeek.com 2009, November 23, Retrieved from. http://www.eweek.com/c/a/Data-Storage/10-Key-Differences-Between-Desktop-and-Server-Virtualization-Deployments-152781/.
-
(2009)
eWeek.com
-
-
Preimesberger, C.1
-
28
-
-
84882346287
-
-
http://www.wmware.com.
-
-
-
-
29
-
-
84882444898
-
-
http://www.wmware.com.
-
-
-
-
30
-
-
84882435953
-
-
http://www.parallels.com.
-
-
-
-
31
-
-
84882318395
-
-
http://www.microsoft.com/windows/virtual-pc/.
-
-
-
-
32
-
-
84882406454
-
-
http://www.virtualbox.org/manual/UserManual.html.
-
-
-
-
33
-
-
84882381953
-
-
http://www.xen.org/support/documentation.html.
-
-
-
-
34
-
-
84882401596
-
-
http://www.linux-forensics.com/.
-
-
-
-
35
-
-
84882370380
-
-
http://www.vmware.com/appliances/directory/213673.
-
-
-
-
36
-
-
84882424602
-
-
http://www.vmware.com/appliances/directory/813.
-
-
-
-
37
-
-
84882441453
-
-
http://www.e-fense.com/helix3pro.
-
-
-
-
38
-
-
84882409158
-
-
http://www.vmware.com/appliances/directory/57815.
-
-
-
-
39
-
-
84882338605
-
-
http://www.caine-live.net/.
-
-
-
-
41
-
-
84882432812
-
Parallels virtuozzo containers offers 350 templates
-
Marshall D. Parallels virtuozzo containers offers 350 templates. InfoWorld virtualization report 2008, Retrieved from http://weblog.infoworld.com/virtualization/archives/2008/02/parallels_virtu.html.
-
(2008)
InfoWorld virtualization report
-
-
Marshall, D.1
-
43
-
-
84882316081
-
-
RingCube MojoPac
-
RingCube MojoPac. http://www.mojopac.com/enterprise/products/index.html.
-
-
-
-
44
-
-
84882301166
-
-
LivePCs. Moka5.
-
LivePCs. Moka5. http://www.moka5.com/products/index.html.
-
-
-
-
45
-
-
84882365909
-
Cool vendors in PC technologies, 2007
-
Retrieved from
-
Fiering L., Silver M.A., Gammage B., Unsworth J., Smith D.M. Cool vendors in PC technologies, 2007. Gartner, Inc 2007, Retrieved from. http://www.gartner.com/DisplayDocument?id=502005.
-
(2007)
Gartner, Inc
-
-
Fiering, L.1
Silver, M.A.2
Gammage, B.3
Unsworth, J.4
Smith, D.M.5
-
46
-
-
84882385372
-
-
Run IT on a virtual hard disk - test drive program. Microsoft TechNet. Retrieved from
-
Run IT on a virtual hard disk - test drive program. Microsoft TechNet. Retrieved from. http://technet.microsoft.com/en-us/bb738372.aspx.
-
-
-
-
47
-
-
84882292455
-
-
Virtualization from the datacenter to the desktop. Microsoft TechNet. Retrieved from
-
Virtualization from the datacenter to the desktop. Microsoft TechNet. Retrieved from. http://technet.microsoft.com/en-us/virtualserver/bb676673.aspx.
-
-
-
-
48
-
-
84882332479
-
-
http://www.wmware.com.
-
-
-
-
49
-
-
84882367489
-
-
http://www.parallels.com.
-
-
-
-
50
-
-
84882341343
-
-
http://www.xen.org/support/documentation.html.
-
-
-
-
53
-
-
84882405304
-
-
http://www.vmware.com/appliances/getting-started/learn/faq.html.
-
-
-
-
54
-
-
84882336484
-
-
MetroPipe
-
The free portable privacy machine MetroPipe. http://www.metropipe.net/ppm.php?SID=4e38766ea6a3fab4792ced91b2bdbe48.
-
The free portable privacy machine
-
-
-
55
-
-
70350043605
-
Hiding in a virtual world using unconventionally installed operating systems
-
Dallas, TX.
-
Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326%26authDecision=-203.
-
(2009)
IEEE International Conference on Intelligence and Security Informatics.
-
-
Bares, R.1
-
56
-
-
79952337297
-
-
Microsoft Corporation, Retrieved from
-
Virtual hard disk image format specification 2009, Microsoft Corporation, Retrieved from. http://download.microsoft.com/../Virtual%20Hard%20Disk%20Format%20Spec_10_18_06.doc.
-
(2009)
Virtual hard disk image format specification
-
-
-
57
-
-
33847308562
-
Tackling the U3 trend with computer forensics
-
Retrieved from
-
Spruill A., Pavan C. Tackling the U3 trend with computer forensics. Journal of Digital Investigation 2007, 4(1). Retrieved from. http://www.sciencedirect.com/science?_ob=ArticleURL%26_udi=B7CW4-4N440CB-1%26_user=8303832%26_coverDate=03%2F31%2F2007%26_rdoc=1%26_fmt=high%26_orig=search%26_sort=d%26_docanchor=%26view=c%26_searchStrId=1285052568%26_rerunOrigin=google%26_acct=C000000593%26_version=1%26_urlVersion=0%26_userid=8303832%26md5=a1cb63ae1f78f6b950cc2a28c540f4ed.
-
(2007)
Journal of Digital Investigation
, vol.4
, Issue.1
-
-
Spruill, A.1
Pavan, C.2
-
60
-
-
70350043605
-
Hiding in a virtual world using unconventionally installed operating systems.
-
Dallas, TX.
-
Bares, R. (2009). Hiding in a virtual world using unconventionally installed operating systems. IEEE International Conference on Intelligence and Security Informatics. Dallas, TX. Retrieved from http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%.2Fiel5%2F5089313%2F5137253%2F05137326.pdf%3Farnumber%3D5137326&authDecision=-203.
-
(2009)
IEEE International Conference on Intelligence and Security Informatics.
-
-
Bares, R.1
-
61
-
-
84882425555
-
Ghost in the machine: Forensic evidence collection in the virtual environment
-
Fiterman E.M., Durick J.D. Ghost in the machine: Forensic evidence collection in the virtual environment. Digital Forensics Magazine 2010, 2:73-77.
-
(2010)
Digital Forensics Magazine
, vol.2
, pp. 73-77
-
-
Fiterman, E.M.1
Durick, J.D.2
-
63
-
-
84882351674
-
-
VMware GSX server documentation
-
VMware GSX server documentation. http://www.vmware.com/support/gsx25/doc/performance_memory_reserved_gsx.html.
-
-
-
-
64
-
-
84882317259
-
-
VMware patents applied for
-
VMware patents applied for. http://www.patentstorm.us/attorney-applications/VMware__Inc_/241723/1.html.
-
-
-
-
65
-
-
84882437209
-
-
http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1244430,00.html.
-
-
-
-
67
-
-
38349023177
-
Attacks on more virtual machine emulators
-
Retrieved from
-
Ferrie P. Attacks on more virtual machine emulators. Symantic Advanced Threat Research 2007, Retrieved from. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf.
-
(2007)
Symantic Advanced Threat Research
-
-
Ferrie, P.1
-
69
-
-
84898096655
-
Virtual machine forensics, a discussion of virtual machines related to forensics analysis
-
Retrieved from
-
Shavers B. Virtual machine forensics, a discussion of virtual machines related to forensics analysis. Forensic Focus 2008, Retrieved from. http://www.forensicfocus.com.
-
(2008)
Forensic Focus
-
-
Shavers, B.1
-
70
-
-
84882417710
-
-
Contributor Accessed 14.03.07.
-
Stagner, H. (2007). How to detect rogue virtual machines on a network. Retrieved from. Contributor Accessed 14.03.07. http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1247530_mem1,00.html.
-
(2007)
How to detect rogue virtual machines on a network.
-
-
Stagner, H.1
-
71
-
-
84882316038
-
Evidentiary value of link files
-
Retrieved from
-
Weilbacher N. Evidentiary value of link files. Forensic Focus 2006, Retrieved from. http://www.forensicfocus.com/link-file-evidentiary-value.
-
(2006)
Forensic Focus
-
-
Weilbacher, N.1
-
72
-
-
84882393405
-
Inventorying virtual hard disk files on a server or domain
-
Retrieved from
-
Wolf C. Inventorying virtual hard disk files on a server or domain. Virtualization Review 2007, Retrieved from. http://virtualizationreview.com/articles/2007/05/01/inventorying-virtualhard-disk-files-on-a-server-or-domain.aspx.
-
(2007)
Virtualization Review
-
-
Wolf, C.1
-
73
-
-
84882437914
-
Rogue VMs be very afraid
-
Retrieved from, Accessed 01.06.08.
-
Wolf C. Rogue VMs be very afraid. Virtualization Review 2008, Retrieved from, Accessed 01.06.08. http://virtualizationreview.com/articles/2008/06/01/rogue-vms-be-very-afraid.aspx.
-
(2008)
Virtualization Review
-
-
Wolf, C.1
-
74
-
-
84882380803
-
-
Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180
-
Understanding virtual machine snapshots in VMware ESX, VMware's KB article 1015180,. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180.
-
-
-
-
75
-
-
84882310267
-
-
What files make up a virtual machine?
-
What files make up a virtual machine? http://www.vmware.com/support/ws55/doc/ws_learningfiles_in_a_vm.html.
-
-
-
-
76
-
-
84882422144
-
-
Understanding virtual machine snapshots in VMware ESX.
-
Understanding virtual machine snapshots in VMware ESX. http://kb.vmware.com/selfservice/microsites/search.do%3Flanguage=en_US%26cmd=displayKC%26externalId=1015180.
-
-
-
-
77
-
-
84882310238
-
-
http://www.virtualizationdaily.com/archives/73_how-to-convert-a-vmware-virtual-appliance-to-work-with-parallels.html.
-
-
-
-
78
-
-
84882397574
-
-
http://vmtoolkit.com/.
-
-
-
-
79
-
-
84882307467
-
-
http://viethak.com/2009/11/27/Convert-VMDK-to-VHD-Virtual-Disk-or-Vice-versa-Using-StarWind-Image-Converter.html.
-
-
-
-
80
-
-
84882436826
-
-
Accessed 12.11.08
-
Barrett A. VMware makes the case for PCI DSS compliance Retrieved from http://searchservervirtualization.techtarget.com/news/article/0,289142,sid94_gci1338681,00.html. Accessed 12.11.08. http://SearchServerVirtualization.com.
-
VMware makes the case for PCI DSS compliance
-
-
Barrett, A.1
-
81
-
-
74549210176
-
Computer forensic analysis in a virtual environment
-
Fall
-
Bem D., Huebner E. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence 2007, Fall, 6(2). http://www.ijde.org.
-
(2007)
International Journal of Digital Evidence
, vol.6
, Issue.2
-
-
Bem, D.1
Huebner, E.2
-
82
-
-
84882304651
-
Automating D2D backup of virtual machines
-
Retrevied from, Accessed 01.10.09
-
Fegreus J. Automating D2D backup of virtual machines. InfoStor 2009, Retrevied from, Accessed 01.10.09. http://www.infostor.com/index/articles/display/articles/infostor/backup-and_recovery/disk-based-backup/lab-review__automating.html.
-
(2009)
InfoStor
-
-
Fegreus, J.1
-
83
-
-
84882351470
-
How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization
-
Retrieved from
-
Hau W., Araujo R., Chudgar V., Hustad R., Chaubal C. How virtualization affects PCI DSS Part 1: Mapping PCI requirements and virtualization. VMware 2009, Retrieved from. http://www.vmware.com/files/pdf/technology/mapping_pci_req_part1_wp.pdf.
-
(2009)
VMware
-
-
Hau, W.1
Araujo, R.2
Chudgar, V.3
Hustad, R.4
Chaubal, C.5
-
84
-
-
84882360006
-
How virtualization affects PCI DSS Part 2: a review of the top five issues
-
Retrieved from
-
Hau W., Araujo R., Chudgar V., Hustad R., Chaubal C. How virtualization affects PCI DSS Part 2: a review of the top five issues. VMware 2010, Retrieved from. http://www.vmware.com/files/pdf/technology/review_top5_issues_wp.pdf.
-
(2010)
VMware
-
-
Hau, W.1
Araujo, R.2
Chudgar, V.3
Hustad, R.4
Chaubal, C.5
-
85
-
-
84882413365
-
Virtual machines you have to see them to manage them
-
Retrieved from
-
Kusnetzky D. Virtual machines you have to see them to manage them. Kusnetsky group 2007, Retrieved from. http://www.virtual-strategy.com/Dan-Kusnetzky/Virtual-Machines-You-Have-to-See-Them-to-Manage-Them.html.
-
(2007)
Kusnetsky group
-
-
Kusnetzky, D.1
-
86
-
-
84882368297
-
Virtual machines can be an e-discovery nightmare
-
Retrieved from
-
Miller R. Virtual machines can be an e-discovery nightmare. Fierce Content Management 2008, Retrieved from. http://www.fiercecontentmanagement.com/story/virtual-machines-can-be-e-discovery-nightmare/2008-09-11.
-
(2008)
Fierce Content Management
-
-
Miller, R.1
-
87
-
-
84882443234
-
How to find virtual machines for greater virtualization compliance
-
Retrieved from, Accessed 07.08.09
-
Mortman D. How to find virtual machines for greater virtualization compliance. Information Security Magazine 2009, Retrieved from, Accessed 07.08.09. http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1359272,00.html.
-
(2009)
Information Security Magazine
-
-
Mortman, D.1
-
88
-
-
84882352427
-
Virtual machines pose e-discovery risk, vendor says
-
September 10
-
Shread P. Virtual machines pose e-discovery risk, vendor says. EnterpriseStorageForum 2008, September 10, Retrieved from. http://www.enterprisestorageforum.com/article.php/3770706.
-
(2008)
EnterpriseStorageForum
-
-
Shread, P.1
-
90
-
-
84882335159
-
-
How Virtualization Affects EDD Collection ()
-
How Virtualization Affects EDD Collection (). http://Law.com.
-
-
-
-
91
-
-
84882324463
-
-
VM Sprawl - prevention rather than cure., Accessed 17.05.09.
-
VM Sprawl - prevention rather than cure., Accessed 17.05.09. http://www.techworld.com/virtualisation/news/index.cfm?newsID=115876&pagtype.
-
-
-
-
92
-
-
84882349645
-
-
Data center virtualization: Four steps to compliance, Special to SearchCIOMidmarket.com,. Accessed 11.06.08.
-
Data center virtualization: Four steps to compliance, Special to SearchCIOMidmarket.com,. Accessed 11.06.08. http://searchcompliance.techtarget.com/tip/0,289483,sid195_gci1340735_mem1,00.html.
-
-
-
-
93
-
-
84882382641
-
Virtualization: Enough holes to work Vegas
-
Retrieved from
-
Capelis D.J. Virtualization: Enough holes to work Vegas. Defcon 15, Las Vegas 2007, Retrieved from. http://www.dc414.org/download/confs/defcon15/Speakers/Capelis/dc-15-%20capelis.pdf.
-
(2007)
Defcon 15, Las Vegas
-
-
Capelis, D.J.1
-
94
-
-
84882329858
-
Hypervisor security concerns
-
Retrieved from
-
Cargile A. Hypervisor security concerns. The Coffee Desk 2009, Retrieved from. http://thecoffeedesk.com/news/index.php/2009/12/01/hypervisor-security-concerns/.
-
(2009)
The Coffee Desk
-
-
Cargile, A.1
-
96
-
-
77953163208
-
Virtual machine security guidelines (version 1)
-
Retrieved from, J. Kirch (Ed.)
-
Virtual machine security guidelines (version 1). The Center for Internet Security 2007, Retrieved from. http://www.cisecurity.org/tools2/vm/CIS_VM_Benchmark_v1.0.pdf, J. Kirch (Ed.).
-
(2007)
The Center for Internet Security
-
-
-
97
-
-
38349023177
-
Attacks on more virtual machine emulators
-
Retrieved from
-
Ferrie P. Attacks on more virtual machine emulators. Symantic Advanced Threat Research 2007, Retrieved from. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf.
-
(2007)
Symantic Advanced Threat Research
-
-
Ferrie, P.1
-
98
-
-
84882447422
-
-
Retrieved from
-
Hankeln video Retrieved from. http://sanbarrow.com/latest-videoesxi-exe.html.
-
-
-
Hankeln, V.1
-
99
-
-
34249852320
-
-
Retrieved from
-
King S.T., Chen P.M., Wang Y.-M., Verbowski C., Wang H.J., Lorch J.R. SubVirt: implementing malware with virtual machines Retrieved from. http://portal.acm.org/citation.cfm%3Fid=1130383.
-
SubVirt: implementing malware with virtual machines
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.-M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
100
-
-
84893734563
-
On the cutting edge: Thwarting virtual machine
-
Retrieved from
-
Liston T., Skoudis E. On the cutting edge: Thwarting virtual machine. IntelGuardians 2006, Retrieved from. http://handlers.sans.org/tliston/ThwartingVMDetection_Liston_Skoudis.pdf.
-
(2006)
IntelGuardians
-
-
Liston, T.1
Skoudis, E.2
-
101
-
-
84882309908
-
Data recovery and information about solid state devices and NAND flash memory
-
August
-
Moulton S. Data recovery and information about solid state devices and NAND flash memory. Video posted to 2008, August, http://www.youtube.com/view_play_list%3Fp=C337FACBF12BDCE2.
-
(2008)
Video posted to
-
-
Moulton, S.1
-
104
-
-
84882420575
-
-
TIG Security Technical Implementation Guides Information Assurance Support Environment
-
STIG Security Technical Implementation Guides Information Assurance Support Environment Retrieved from. http://iase.disa.mil/stigs/stig/index.html.
-
-
-
-
108
-
-
84882415426
-
-
Install and Configure ESX server
-
Install and Configure ESX server. http://virtualizationinformation.com/docs/Notes%20on%20VI%203.pdf.
-
-
-
-
109
-
-
84882314265
-
-
Defragmenting virtual machine files
-
Defragmenting virtual machine files. http://itknowledgeexchange.techtarget.com/virtualization-pro/defragmenting-virtual-machine-disk-files/.
-
-
-
-
110
-
-
84882438851
-
-
VMware, Randell. August presentation to the Arizona Security Practitioners Forum (AZSPF)
-
VMware, Randell. August 2008 presentation to the Arizona Security Practitioners Forum (AZSPF).
-
(2008)
-
-
-
111
-
-
84882351970
-
-
Xen Wiki Hypercall formal definition
-
Xen Wiki Hypercall formal definition.
-
-
-
-
113
-
-
84882381949
-
-
Network segmentation in virtualized environments. VMware white paper.
-
Network segmentation in virtualized environments. VMware white paper. http://www.vmware.com/files/pdf/network_segmentation.pdf.
-
-
-
-
114
-
-
84882379544
-
-
InfoClipz: Cloud Computing. April 2009.
-
InfoClipz: Cloud Computing. April 2009. http://InfoWorld.com.
-
-
-
-
115
-
-
84882343450
-
Cloud computing deep dive
-
September
-
Beckman M. Cloud computing deep dive. InfoWorld 2009, September.
-
(2009)
InfoWorld
-
-
Beckman, M.1
-
116
-
-
84882434493
-
Cloud computing and network forensics in the eyes of computer forensic examiner
-
02/
-
Amoah S. Cloud computing and network forensics in the eyes of computer forensic examiner. Decision Group 02/2010.
-
(2010)
Decision Group
-
-
Amoah, S.1
-
118
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
December
-
Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance December 2009.
-
(2009)
Cloud Security Alliance
-
-
-
119
-
-
0008636977
-
-
Lomond Publication, Inc., Mt. Airy, MD
-
Coates J., Jarrat J. What futurists believe 1989, Lomond Publication, Inc., Mt. Airy, MD.
-
(1989)
What futurists believe
-
-
Coates, J.1
Jarrat, J.2
-
120
-
-
84882420674
-
The future of virtualization: a view from the front lines
-
May 6
-
Stokes J. The future of virtualization: a view from the front lines. ars technica 2009, May 6, Retrieved from. http://arstechnica.com/business/news/2009/05/the-future-of-virtualization-a-view-from-the-front-lines.ars.
-
(2009)
ars technica
-
-
Stokes, J.1
-
121
-
-
84882335791
-
Virtualization goes mobile
-
April 9
-
Kharif O. Virtualization goes mobile. BusinessWeek Online 2008, April 9, Retrieved from. http://www.businessweek.com/technology/content/apr2008/tc20080421_235517.htm?chan=technology_technology%2Bindex%2Bpage_top%2Bst.
-
(2008)
BusinessWeek Online
-
-
Kharif, O.1
-
122
-
-
84882339316
-
-
VMWare Mobile Virtualization Platform, (n.d.). Retrieved from
-
VMWare Mobile Virtualization Platform, (n.d.). Retrieved from. http://www.vmware.com/products/mobile/.
-
-
-
-
123
-
-
84882290509
-
-
Retrieved from
-
Tozzi J. The rise of the Homepreneur Retrieved from. http://www.businessweek.com/smallbiz/content/oct2009/sb20091023_263258.htm.
-
The rise of the Homepreneur
-
-
Tozzi, J.1
-
124
-
-
84882310817
-
Mobile phone virtualization to really enable workers and IT staff
-
NetworkWorld Asia Staff, September 4
-
Mobile phone virtualization to really enable workers and IT staff. NetworkWorldAsia 2009, September 4, NetworkWorld Asia Staff, Retrieved from. http://www.networksasia.net/content/mobile-phone-virtualization-really-enable-workers-and-it-staff.
-
(2009)
NetworkWorldAsia
-
-
-
126
-
-
84882384449
-
-
Retrieved from
-
Mark R. House Passes Cyber-Security Act Retrieved from. http://www.eweek.com/c/a/Government-IT/House-Passes-Cybersecurity-Act-682741/.
-
House Passes Cyber-Security Act
-
-
Mark, R.1
-
127
-
-
83055189175
-
Gartner: Brace yourself for cloud computing
-
October 20
-
Shankland S. Gartner: Brace yourself for cloud computing. CNET news 2009, October 20, Retrieved from. http://news.cnet.com/8301-30685_3-10378782-264.html.
-
(2009)
CNET news
-
-
Shankland, S.1
-
129
-
-
84882300055
-
How autonomic computing will reshape IT
-
October 15
-
Horn P. How autonomic computing will reshape IT. CNET news 2001, October 15, Retrieved from. http://news.cnet.com/2010-1071-281578.html.
-
(2001)
CNET news
-
-
Horn, P.1
|