[1]
|
Neiger, G., Santoni, A., Leung, F. and Rodgers, D. (2006) Intel Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal, 10, 167. http://dx.doi.org/10.1535/itj
|
[2]
|
Neuman, L.W. (2006) Social Research Methods: Qualitative and Quantitative Approaches. 6th Editon, Allyn and Bacon, Boston.
|
[3]
|
Nikhil, B. (2009) Performance Evaluation of Intel EPT Hardware Assist. VMware, Inc., California.
http://www.vmware.com
|
[4]
|
Nikitasha, P., Jyotiprakash, S., Subasish, M. and Prasanna, P.S. (2011) A Security Framework for Virtualization Based Computing Environment. International Journal of Engineering Science and Technology, 3, 6423-6429.
http://www.techrepublic.com/research-library
|
[5]
|
Park, Y.R. and Sharma, S. (2009) Providing Service Using a Virtualization Infrastructure. Journal of Service Science, 2, 17-22. http://search.proquest.com/docview/195627357?accountid=35812
|
[6]
|
Payne, B.D. (2010) Improving Host-Based Computer Security Using Secure Active Monitoring and Memory Analysis. Georgia Institute of Technology, Atlanta. http://www.bryanpayne.org/
|
[7]
|
Peng, Q. and Yu, C. (2007) Enhanced Integrated Manufacturing Systems in an Immersive Virtual Environment. Proceedings of the Institution of Mechanical Engineers, 221, 477-487.
http://search.proquest.com/docview/195146511?accountid=35812
http://dx.doi.org/10.1243/09544054JEM453
|
[8]
|
Perkins, G.H. (2004) Will Libraries’ Web-Based Survey Methods Replace Existing Nonelectronic Survey Methods. Information Technology and Libraries, 23, 123-126.
|
[9]
|
Petter, S., Delone, W. and McLean, E. (2008) Measuring Information Systems Success: Models, Dimensions, Measures, and Interrelationships. European Journal of Information Systems, 17, 236-263. http://www.palgrave-journals.com
http://dx.doi.org/10.1057/ejis.2008.15
|
[10]
|
Pozgaj, Z. and Strahonja, J. (2008) It Service Management Based on Itil Methodology. 965-978.
http://search.proquest.com/docview/217738441?accountid=35812
|
[11]
|
Prism MicroSystems (2010) 2010 State of Virtualization Security Survey.
http://www.prismmicrosys.com/documents/VirtualizationSecuritySurvey2010.pdf
|
[12]
|
Reichman, A. (2009) Rethinking Storage for Server Virtualization Environments. TechTarget.
http://searchservervirtualization.techtarget.com
|
[13]
|
Rosnow, R.L. and Rosenthal, R. (2008) Beginning Behavioral Research: A Conceptual Primer. 6th Edition, Pearson Prentice Hall, Upper Saddle River.
|
[14]
|
RSA List Service (2012) Fortune 1000 Company List. http://www.rsalistsinc.com
|
[15]
|
Samoilenko, S. (2008) Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories. Information Systems Frontiers, 10, 281-292.
http://dx.doi.org/10.1007/s10796-008-9078-3
|
[16]
|
Sandifer, C. (2008) The Economics of Virtualization. University of South Carolina, Columbia.
http://search.proquest.com
|
[17]
|
Scadden, R., Bogdany, R., Clifford, J., Pearthree, H. and Locke, R. (2008) Resilient Hosting in a Continuously Available Virtualized Environment. IBM Systems Journal, 47, 535-548.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5386523
http://dx.doi.org/10.1147/SJ.2008.5386523
|
[18]
|
Seiler, S. and Pfister, A.C. (2009) Why Did I Do This: Understanding Leadership Behavior through a Dynamic Five-Factor Model of Leadership? Journal of Leadership Studies, 3, 41-52. http://dx.doi.org/10.1002/jls.20122
|