This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks--
Piracy-free
Assured Quality
Secure Transactions
*COD & Shipping Charges may apply on certain items.