Knowledge Resources | Dar Al-hikmah Library | Public Access
Subject(s): Computer crimes -- Investigation | Virtual computer systems -- Security measures | Computer security Contents:How virtualization happens -- Server virtualization -- Desktop virtualization -- Portable virtualization, emulators, and appliances -- Investigation dead virtual environments -- Investigating live virtual environments -