Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Cloud Computing
Concepts, Technology, Security, and Architecture
Taschenbuch von Thomas Erl (u. a.)
Sprache: Englisch

44,85 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

auf Lager, Lieferzeit 1-2 Werktage

Kategorien:
Beschreibung
Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infras...
Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infras...
Über den Autor

Thomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel [...] He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events.

At Arcitura Education ([...] Thomas leads the development of curricula for internationally recognized, vendor-neutral training and accreditation programs. Arcitura's portfolio currently consists of over 100 courses, over 100 Pearson VUE exams, and over 40 certification tracks, covering topics such as Cloud Computing Architecture, Security, and Governance, as well as Digital Transformation, Robotic Process Automation (RPA), DevOps, Blockchain, IoT, Containerization, Machine Learning, Artificial Intelligence (AI), Cybersecurity, Service-Oriented Architecture (SOA), and Big Data Analytics. Thomas is also the founder and senior advisor at Transformative Digital Solutions ([...] and a freelance LinkedIn instructor and courseware author.

[...]

Eric Barceló Monroy is an IT professional with extensive experience in IT strategic planning, operational and administrative process reengineering, system implementation project management, and IT operations. He has a proven track record of implementing systems that exceed user expectations while reducing costs and improving response times. He has held various high-level positions in both the private and public sectors, including Director of Information Technology at Farmacéuticos MAYPO, a pharmaceutical distributor; Vice-president of Telecommunications and Technology Operations at iExplore, an internet-based adventure travel agency; and Director of Information Technology and Telecommunications at the Ministry of Education in Tabasco, Mexico, where he oversaw the implementation of telecommunication networks among schools and develops and delivers computer literacy training programs for faculty.

Additionally, he is a partner and Technical Consulting Director at EGN, a cloud technology consulting and training firm, where he provides IT consultancy on state of-theart topics like Big Data, Cloud Computing, Virtualization, Advanced Networking, and Strategic IT Management. Eric is a Certified Cloud Computing Technology Professional, Certified Cloud Virtualization Specialist, and Certified Cloud Architect, among others. He is also a VMware Certified Professional, Red Hat Certified System Administrator, Red Hat Certified Engineer, and Certified Amazon Web Services Solutions Architect.

Inhaltsverzeichnis

Foreword
About the Authors
Acknowledgments
Chapter 1: Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
Part I: Fundamental Cloud Computing
Chapter 3: Understanding Cloud Computing
Chapter 4: Fundamental Concepts and Models
Chapter 5: Cloud-Enabling Technology
Chapter 6: Understanding Containerization
Chapter 7: Understanding Cloud Security and Cybersecurity
Part II: Cloud Computing Mechanisms
Chapter 8: Cloud Infrastructure Mechanisms
Chapter 9: Specialized Cloud Mechanisms
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
Chapter 12: Cloud Management Mechanisms
Part III: Cloud Computing Architecture
Chapter 13: Fundamental Cloud Architectures
Chapter 14: Advanced Cloud Architectures
Chapter 15: Specialized Cloud Architectures
Part IV: Working with Clouds
Chapter 16: Cloud Delivery Model Considerations
Chapter 17: Cost Metrics and Pricing Models
Chapter 18: Service Quality Metrics and SLAs
Part V: Appendices
Appendix A: Case Study Conclusions
Appendix B: Common Containerization Technologies
1.5 Resources
Pearson Digital Enterprise Book Series
Thomas Erl on YouTube
The Digital Enterprise Newsletter on LinkedIn
Cloud Certified Professional (CCP) Program
Chapter 2: Case Study Background
2.1 Case Study #1: ATN
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
Technical Infrastructure and Environment
Business Goals and Strategy
Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
A Brief History
Definitions
Business Drivers
Cost Reduction
Business Agility
Technology Innovations
Clustering
Grid Computing
Capacity Planning
Virtualization
Containerization
Serverless Environments
3.2 Basic Concepts and Terminology
Cloud
Container
IT Resource
On Premises
Cloud Consumers and Cloud Providers
Scaling
Horizontal Scaling
Vertical Scaling
Cloud Service
Cloud Service Consumer
3.3 Goals and Benefits
Increased Responsiveness
Reduced Investments and Proportional Costs
Increased Scalability
Increased Availability and Reliability
3.4 Risks and Challenges
Increased Vulnerability Due to Overlapping Trust Boundaries
Increased Vulnerability Due to Shared Security Responsibility
Increased Exposure to Cyber Threats
Reduced Operational Governance Control
Limited Portability Between Cloud Providers
Multiregional Compliance and Legal Issues
Cost Overruns
Chapter 4: Fundamental Concepts and Models
4.1 Roles and Boundaries
Cloud Provider
Cloud Consumer
Cloud Broker
Cloud Service Owner
Cloud Resource Administrator
Additional Roles
Organizational Boundary
Trust Boundary
4.2 Cloud Characteristics
On-Demand Usage
Ubiquitous Access
Multitenancy (and Resource Pooling)
Elasticity
Measured Usage
Resiliency
4.3 Cloud Delivery Models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Comparing Cloud Delivery Models
Combining Cloud Delivery Models
IaaS + PaaS
IaaS + PaaS + SaaS
Cloud Delivery Submodels
4.4 Cloud Deployment Models
Public Clouds
Private Clouds
Multiclouds
Hybrid Clouds
Chapter 5: Cloud-Enabling Technology
5.1 Networks and Internet Architecture
Internet Service Providers (ISPs)
Connectionless Packet Switching (Datagram Networks)
Router-Based Interconnectivity
Physical Network
Transport Layer Protocol
Application Layer Protocol
Technical and Business Considerations
Connectivity Issues
Network Bandwidth and Latency Issues
Wireless and Cellular
Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
Virtualization
Standardization and Modularity
Autonomic Computing
Remote Operation and Management
High Availability
Security-Aware Design, Operation, and Management
Facilities
Computing Hardware
Storage Hardware
Network Hardware
Carrier and External Networks Interconnection
Web-Tier Load Balancing and Acceleration
LAN Fabric
SAN Fabric
NAS Gateways
Serverless Environments
NoSQL Clustering
Other Considerations
5.3 Modern Virtualization
Hardware Independence
Server Consolidation
Resource Replication
Operating SystemBased Virtualization
Hardware-Based Virtualization
Containers and Application-Based Virtualization
Virtualization Management
Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
REST Services
Web Services
Service Agents
Service Middleware
Web-Based RPC
5.6 Case Study Example
Chapter 6: Understanding Containerization
6.1 Origins and Influences
A Brief History
Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
Operating System Basics
Virtualization Basics
Physical Servers
Virtual Servers
Hypervisors
Virtualization Types
Containerization Basics
Containers
Container Images
Container Engines
Pods
Hosts
Host Clusters
Host Networks and Overlay Networks
Virtualization and Containerization
Containerization on Physical Servers
Containerization on Virtual Servers
Containerization Benefits
Containerization Risks and Challenges
6.3 Understanding Containers
Container Hosting
Containers and Pods
Container Instances and Clusters
Container Package Management
Container Orchestration
Container Package Manager vs. Container Orchestrator
Container Networks
Container Network Scope
Container Network Addresses
Rich Containers
Other Common Container Characteristics
6.4 Understanding Container Images
Container Image Types and Roles
Container Image Immutability
Container Image Abstraction
Operating System Kernel Abstraction
Operating System Abstraction Beyond the Kernel
Container Build Files
Container Image Layers
How Customized Container Images Are Created
6.5 Multi-Container Types
Sidecar Container
Adapter Container
Ambassador Container
Using Multi-Containers Together
6.6 Case Study Example
Chapter 7: Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
Confidentiality
Integrity
Availability
Authenticity
Security Controls
Security Mechanisms
Security Policies
7.2 Basic Threat Terminology
Risk
Vulnerability
Exploit
Zero-Day Vulnerability
Security Breach
Data Breach
Data Leak
Threat (or Cyber Threat)
Attack (or Cyber Attack)
Attacker and Intruder
Attack Vector and Surface
7.3 Threat Agents
Anonymous Attacker
Malicious Service Agent
Trusted Attacker
Malicious Insider
7.4 Common Threats
Traffic Eavesdropping
Malicious Intermediary
Denial of Service
Insufficient Authorization
Virtualization Attack
Overlapping Trust Boundaries
Containerization Attack
Malware
Insider Threat
Social Engineering and Phishing
Botnet
Privilege Escalation
Brute Force
Remote Code Execution
SQL Injection
Tunneling
Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
Flawed Implementations
Security Policy Disparity
Contracts
Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
Case Study Example
8.2 Virtual Server
Case Study Example
8.3 Hypervisor
Case Study Example
8.4 Cloud Storage Device
Cloud Storage Levels
Network Storage Interfaces
Object Storage Interfaces
...

Details
Erscheinungsjahr: 2023
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780138052256
ISBN-10: 0138052255
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Erl, Thomas
Monroy, Eric Barcelo
Auflage: 2. Auflage
Hersteller: Prentice Hall
Maße: 230 x 174 x 31 mm
Von/Mit: Thomas Erl (u. a.)
Erscheinungsdatum: 02.08.2023
Gewicht: 1,036 kg
Artikel-ID: 125730750
Über den Autor

Thomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel [...] He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events.

At Arcitura Education ([...] Thomas leads the development of curricula for internationally recognized, vendor-neutral training and accreditation programs. Arcitura's portfolio currently consists of over 100 courses, over 100 Pearson VUE exams, and over 40 certification tracks, covering topics such as Cloud Computing Architecture, Security, and Governance, as well as Digital Transformation, Robotic Process Automation (RPA), DevOps, Blockchain, IoT, Containerization, Machine Learning, Artificial Intelligence (AI), Cybersecurity, Service-Oriented Architecture (SOA), and Big Data Analytics. Thomas is also the founder and senior advisor at Transformative Digital Solutions ([...] and a freelance LinkedIn instructor and courseware author.

[...]

Eric Barceló Monroy is an IT professional with extensive experience in IT strategic planning, operational and administrative process reengineering, system implementation project management, and IT operations. He has a proven track record of implementing systems that exceed user expectations while reducing costs and improving response times. He has held various high-level positions in both the private and public sectors, including Director of Information Technology at Farmacéuticos MAYPO, a pharmaceutical distributor; Vice-president of Telecommunications and Technology Operations at iExplore, an internet-based adventure travel agency; and Director of Information Technology and Telecommunications at the Ministry of Education in Tabasco, Mexico, where he oversaw the implementation of telecommunication networks among schools and develops and delivers computer literacy training programs for faculty.

Additionally, he is a partner and Technical Consulting Director at EGN, a cloud technology consulting and training firm, where he provides IT consultancy on state of-theart topics like Big Data, Cloud Computing, Virtualization, Advanced Networking, and Strategic IT Management. Eric is a Certified Cloud Computing Technology Professional, Certified Cloud Virtualization Specialist, and Certified Cloud Architect, among others. He is also a VMware Certified Professional, Red Hat Certified System Administrator, Red Hat Certified Engineer, and Certified Amazon Web Services Solutions Architect.

Inhaltsverzeichnis

Foreword
About the Authors
Acknowledgments
Chapter 1: Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
Part I: Fundamental Cloud Computing
Chapter 3: Understanding Cloud Computing
Chapter 4: Fundamental Concepts and Models
Chapter 5: Cloud-Enabling Technology
Chapter 6: Understanding Containerization
Chapter 7: Understanding Cloud Security and Cybersecurity
Part II: Cloud Computing Mechanisms
Chapter 8: Cloud Infrastructure Mechanisms
Chapter 9: Specialized Cloud Mechanisms
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
Chapter 12: Cloud Management Mechanisms
Part III: Cloud Computing Architecture
Chapter 13: Fundamental Cloud Architectures
Chapter 14: Advanced Cloud Architectures
Chapter 15: Specialized Cloud Architectures
Part IV: Working with Clouds
Chapter 16: Cloud Delivery Model Considerations
Chapter 17: Cost Metrics and Pricing Models
Chapter 18: Service Quality Metrics and SLAs
Part V: Appendices
Appendix A: Case Study Conclusions
Appendix B: Common Containerization Technologies
1.5 Resources
Pearson Digital Enterprise Book Series
Thomas Erl on YouTube
The Digital Enterprise Newsletter on LinkedIn
Cloud Certified Professional (CCP) Program
Chapter 2: Case Study Background
2.1 Case Study #1: ATN
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
Technical Infrastructure and Environment
Business Goals and Strategy
Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
A Brief History
Definitions
Business Drivers
Cost Reduction
Business Agility
Technology Innovations
Clustering
Grid Computing
Capacity Planning
Virtualization
Containerization
Serverless Environments
3.2 Basic Concepts and Terminology
Cloud
Container
IT Resource
On Premises
Cloud Consumers and Cloud Providers
Scaling
Horizontal Scaling
Vertical Scaling
Cloud Service
Cloud Service Consumer
3.3 Goals and Benefits
Increased Responsiveness
Reduced Investments and Proportional Costs
Increased Scalability
Increased Availability and Reliability
3.4 Risks and Challenges
Increased Vulnerability Due to Overlapping Trust Boundaries
Increased Vulnerability Due to Shared Security Responsibility
Increased Exposure to Cyber Threats
Reduced Operational Governance Control
Limited Portability Between Cloud Providers
Multiregional Compliance and Legal Issues
Cost Overruns
Chapter 4: Fundamental Concepts and Models
4.1 Roles and Boundaries
Cloud Provider
Cloud Consumer
Cloud Broker
Cloud Service Owner
Cloud Resource Administrator
Additional Roles
Organizational Boundary
Trust Boundary
4.2 Cloud Characteristics
On-Demand Usage
Ubiquitous Access
Multitenancy (and Resource Pooling)
Elasticity
Measured Usage
Resiliency
4.3 Cloud Delivery Models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Comparing Cloud Delivery Models
Combining Cloud Delivery Models
IaaS + PaaS
IaaS + PaaS + SaaS
Cloud Delivery Submodels
4.4 Cloud Deployment Models
Public Clouds
Private Clouds
Multiclouds
Hybrid Clouds
Chapter 5: Cloud-Enabling Technology
5.1 Networks and Internet Architecture
Internet Service Providers (ISPs)
Connectionless Packet Switching (Datagram Networks)
Router-Based Interconnectivity
Physical Network
Transport Layer Protocol
Application Layer Protocol
Technical and Business Considerations
Connectivity Issues
Network Bandwidth and Latency Issues
Wireless and Cellular
Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
Virtualization
Standardization and Modularity
Autonomic Computing
Remote Operation and Management
High Availability
Security-Aware Design, Operation, and Management
Facilities
Computing Hardware
Storage Hardware
Network Hardware
Carrier and External Networks Interconnection
Web-Tier Load Balancing and Acceleration
LAN Fabric
SAN Fabric
NAS Gateways
Serverless Environments
NoSQL Clustering
Other Considerations
5.3 Modern Virtualization
Hardware Independence
Server Consolidation
Resource Replication
Operating SystemBased Virtualization
Hardware-Based Virtualization
Containers and Application-Based Virtualization
Virtualization Management
Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
REST Services
Web Services
Service Agents
Service Middleware
Web-Based RPC
5.6 Case Study Example
Chapter 6: Understanding Containerization
6.1 Origins and Influences
A Brief History
Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
Operating System Basics
Virtualization Basics
Physical Servers
Virtual Servers
Hypervisors
Virtualization Types
Containerization Basics
Containers
Container Images
Container Engines
Pods
Hosts
Host Clusters
Host Networks and Overlay Networks
Virtualization and Containerization
Containerization on Physical Servers
Containerization on Virtual Servers
Containerization Benefits
Containerization Risks and Challenges
6.3 Understanding Containers
Container Hosting
Containers and Pods
Container Instances and Clusters
Container Package Management
Container Orchestration
Container Package Manager vs. Container Orchestrator
Container Networks
Container Network Scope
Container Network Addresses
Rich Containers
Other Common Container Characteristics
6.4 Understanding Container Images
Container Image Types and Roles
Container Image Immutability
Container Image Abstraction
Operating System Kernel Abstraction
Operating System Abstraction Beyond the Kernel
Container Build Files
Container Image Layers
How Customized Container Images Are Created
6.5 Multi-Container Types
Sidecar Container
Adapter Container
Ambassador Container
Using Multi-Containers Together
6.6 Case Study Example
Chapter 7: Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
Confidentiality
Integrity
Availability
Authenticity
Security Controls
Security Mechanisms
Security Policies
7.2 Basic Threat Terminology
Risk
Vulnerability
Exploit
Zero-Day Vulnerability
Security Breach
Data Breach
Data Leak
Threat (or Cyber Threat)
Attack (or Cyber Attack)
Attacker and Intruder
Attack Vector and Surface
7.3 Threat Agents
Anonymous Attacker
Malicious Service Agent
Trusted Attacker
Malicious Insider
7.4 Common Threats
Traffic Eavesdropping
Malicious Intermediary
Denial of Service
Insufficient Authorization
Virtualization Attack
Overlapping Trust Boundaries
Containerization Attack
Malware
Insider Threat
Social Engineering and Phishing
Botnet
Privilege Escalation
Brute Force
Remote Code Execution
SQL Injection
Tunneling
Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
Flawed Implementations
Security Policy Disparity
Contracts
Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
Case Study Example
8.2 Virtual Server
Case Study Example
8.3 Hypervisor
Case Study Example
8.4 Cloud Storage Device
Cloud Storage Levels
Network Storage Interfaces
Object Storage Interfaces
...

Details
Erscheinungsjahr: 2023
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780138052256
ISBN-10: 0138052255
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Erl, Thomas
Monroy, Eric Barcelo
Auflage: 2. Auflage
Hersteller: Prentice Hall
Maße: 230 x 174 x 31 mm
Von/Mit: Thomas Erl (u. a.)
Erscheinungsdatum: 02.08.2023
Gewicht: 1,036 kg
Artikel-ID: 125730750
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte