• 找到相关文档约21篇, 耗时0.16s vmwareworkstation - 文档搜索结果预览与免费下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 What is Virtualization?
      文档预览: NIPCC: Jeffrey W Wilcox 5/16/2009 2 What is Virtualization? ?Originated with IBM Mainframes in the 1960's when several companies might share one computer (and not wish to share data access) ?Modern Personal Computers have enough power to run more than one operating system ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 and the Art of Virtualization
      文档预览: Xen Para-Virtualization Arch Xen/x86 -like x86, but replace privileged instructions with Xen hypercalls É Avoids binary rewriting and fault trapping É For Linux 2.6, only arch-depfiles modified Modify OS to understand virtualised env. É Wall-clock ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 Les techniques de virtualisation
      文档预览: 5 Les techniques de virtualisation (4) ?Virtualisationpar émulateur : ?Une application simule un processeur ou une machine complète (mémoire, disque, réseau, etc). ?Elle intercepte les instructions de la machine virtuelle pour les traduire ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 VmWare - íà?òe?éêà
      文档预览: Выберите Typical. Можно выбрать куда поставить программу, а можно оставить как есть. Где будем делать ярлыки? Это абслютно по ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 On the Cutting Edge: Thwarting Virtual Machine Detection
      文档预览: 1 2006 TomListon/Ed Skoudis 1 On the Cutting Edge: Thwarting Virtual Machine Detection Tom Liston, Senior Security Consultant -Intelguardians Handler -SANSInternet Storm Center tom@intelguardians.com Ed Skoudis, Founder/Senior ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 Strategies for Bare Machine Recovery
      文档预览: Cristie Bare Machine Recovery 2005 Cristie Data Products 2 Differing BMR Strategies ? System reinstallation Full system reinstallation using installation CDs (Windows and ITSM client) JumpStart (Solaris), Ignite (HPUX), NIM (AIX) ? System ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 Automated Defense from Rootkit Attacks
      文档预览: 15 Protected Zones Fig. 1. Figure shows the protected parts of the memory and filesystemthat are shaded in pink. This represents the core of the system, which is alwaysprotected. The unshadedportions consist of all other files and running ... 点击下载
    • 文档格式:pdf 更新日期:2011-10-31
      PDF文档 The State of the hack
      文档预览: Access Hardware ? Hardware techniques are all part of the expansion bus which uses bus-mastering and Direct Memory Access (DMA) ? PCI Tribble Carrier, B.D. and Grand, J. A. hardware-based memory acquisition procedure for digital ... 点击下载
    共搜索到21篇文档 10篇/页 1/3
  • 您可能感兴趣的
  • vmwareworkstationv6