Abstract
In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your understanding of these problems, we do not merely consider them abstractly. Rather, we additionally provide you with a set of preconfigured virtual machines that allow you to work through the examples actively in a virtual environment.
As a virtualization environment we have chosen VirtualBox (http://www.virtualbox.org). VirtualBox runs on Windows, Linux, Macintosh and OpenSolaris hosts, and supports a large number of guest operating systems. By following the instructions below, you should be able to install the virtual machines on your own computer, which you will need to complete the practical experiments in the following chapters. The virtual machines can be downloaded from the book’s web page, www.appliedinfsec.ch.
The structure of this chapter is as follows. We start with a general introduction to VirtualBox and explain its network options. Afterwards we provide information on the virtual machines as they are used for the practical exercises in this book. Besides information on the network setup you will find information on the types of operating systems, installed software, and user accounts in this section. Finally, we provide brief installation instructions for each of the virtual machines used in subsequent chapters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Basin, D., Schaller, P., Schläpfer, M. (2011). The Virtual Environment. In: Applied Information Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24474-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-24474-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24473-5
Online ISBN: 978-3-642-24474-2
eBook Packages: Computer ScienceComputer Science (R0)