Cart

Cloud Computing: Concepts, Technology, and Architecture, Second Edition, 2nd edition

BRAND: PEARSON

Publisher:Pearson
Author: Thomas ErlEric; Barcelo Monroy
Edition: (August 14, 2023) © 2024
eBook ISBN:9780138052188
Print ISBN: 9780138052256
Type: 1 Year Subscription. Dành cho Cá nhân 

eBook edition. 1 Year Subscription. Dành cho Cá nhân  |  Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In  

Số lượng:
Tổng tiền:
Giá có thể thay đổi bất kỳ khi nào.
Thời hạn giao hàng: 03 ngày làm việc với sách eBook và 30 ngày với sách In. Gọi để được Tư vấn Giáo Trình.

Mô tả sản phẩm


Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúc

Điện toán đám mây đã trở thành một phần không thể thiếu và nền tảng của công nghệ thông tin. Phần lớn hoạt động kinh doanh kỹ thuật số và đổi mới công nghệ diễn ra với sự tham gia của môi trường đám mây hiện đại, nơi cung cấp cơ sở hạ tầng công nghệ tự động hóa rất phức tạp và một loạt tài nguyên công nghệ. Để xây dựng, tương tác hoặc tạo thành công môi trường đám mây đòi hỏi sự hiểu biết về cơ chế bên trong, các lớp kiến ​​trúc, mô hình và kiểm soát bảo mật chung của nó. Nó cũng đòi hỏi sự hiểu biết về các yếu tố kinh tế và kinh doanh chứng minh cho việc áp dụng và sử dụng đám mây cũng như các sản phẩm và dịch vụ dựa trên đám mây trong thế giới thực.

Trong Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúc, Thomas Erl, một trong những tác giả CNTT bán chạy nhất thế giới, hợp tác với chuyên gia điện toán đám mây Eric Barceló Monroy và các nhà nghiên cứu để chia nhỏ các công nghệ và thực tiễn điện toán đám mây đã được chứng minh và trưởng thành thành một chuỗi các khái niệm, cơ chế công nghệ và kiến ​​trúc công nghệ được xác định rõ ràng. Nội dung bao gồm toàn diện về các chủ đề về container hóa và an ninh mạng.

Tất cả các chương đều được biên soạn cẩn thận theo quan điểm lấy ngành làm trung tâm và trung lập với nhà cung cấp. Khi làm như vậy, cuốn sách thiết lập nội dung cụ thể, mang tính học thuật, tập trung vào cấu trúc, sự rõ ràng và các khối xây dựng được xác định rõ ràng cho các nền tảng và giải pháp điện toán đám mây và container hóa chính thống. Với gần 370 hình vẽ, 40 mô hình kiến ​​trúc và 50 cơ chế, hướng dẫn không thể thiếu này cung cấp kiến ​​thức toàn diện về điện toán đám mây, container hóa và an ninh mạng hiện đại sẽ không bao giờ rời xa bạn.


Foreword
About the Authors
Acknowledgments
Chapter 1:
Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
    Part I: Fundamental Cloud Computing
        Chapter 3: Understanding Cloud Computing
        Chapter 4: Fundamental Concepts and Models
        Chapter 5: Cloud-Enabling Technology
        Chapter 6: Understanding Containerization
        Chapter 7: Understanding Cloud Security and Cybersecurity
    Part II: Cloud Computing Mechanisms
        Chapter 8: Cloud Infrastructure Mechanisms
        Chapter 9: Specialized Cloud Mechanisms
        Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
        Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
        Chapter 12: Cloud Management Mechanisms
    Part III: Cloud Computing Architecture
        Chapter 13: Fundamental Cloud Architectures
        Chapter 14: Advanced Cloud Architectures
        Chapter 15: Specialized Cloud Architectures
    Part IV: Working with Clouds
        Chapter 16: Cloud Delivery Model Considerations
        Chapter 17: Cost Metrics and Pricing Models
        Chapter 18: Service Quality Metrics and SLAs
    Part V: Appendices
        Appendix A: Case Study Conclusions
        Appendix B: Common Containerization Technologies
1.5 Resources
    Pearson Digital Enterprise Book Series
    Thomas Erl on YouTube
        The Digital Enterprise Newsletter on LinkedIn
    Cloud Certified Professional (CCP) Program
Chapter 2:
Case Study Background
2.1 Case Study #1: ATN
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
    Technical Infrastructure and Environment
    Business Goals and Strategy
    Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
    A Brief History
    Definitions
    Business Drivers
        Cost Reduction
        Business Agility
    Technology Innovations
        Clustering
        Grid Computing
        Capacity Planning
        Virtualization
        Containerization
        Serverless Environments
3.2 Basic Concepts and Terminology
    Cloud
    Container
    IT Resource
    On Premises
    Cloud Consumers and Cloud Providers
    Scaling
        Horizontal Scaling
        Vertical Scaling
    Cloud Service
    Cloud Service Consumer
3.3 Goals and Benefits
    Increased Responsiveness
    Reduced Investments and Proportional Costs
    Increased Scalability
    Increased Availability and Reliability
3.4 Risks and Challenges
    Increased Vulnerability Due to Overlapping Trust Boundaries
    Increased Vulnerability Due to Shared Security Responsibility
    Increased Exposure to Cyber Threats
    Reduced Operational Governance Control
    Limited Portability Between Cloud Providers
    Multiregional Compliance and Legal Issues
    Cost Overruns
Chapter 4:
Fundamental Concepts and Models
4.1 Roles and Boundaries
    Cloud Provider
    Cloud Consumer
    Cloud Broker
    Cloud Service Owner
    Cloud Resource Administrator
    Additional Roles
    Organizational Boundary
    Trust Boundary
4.2 Cloud Characteristics
    On-Demand Usage
    Ubiquitous Access
    Multitenancy (and Resource Pooling)
    Elasticity
    Measured Usage
    Resiliency
4.3 Cloud Delivery Models
    Infrastructure as a Service (IaaS)
    Platform as a Service (PaaS)
    Software as a Service (SaaS)
    Comparing Cloud Delivery Models
    Combining Cloud Delivery Models
        IaaS + PaaS
        IaaS + PaaS + SaaS
    Cloud Delivery Submodels
4.4 Cloud Deployment Models
    Public Clouds
    Private Clouds
    Multiclouds
    Hybrid Clouds
Chapter 5:
Cloud-Enabling Technology
5.1 Networks and Internet Architecture
    Internet Service Providers (ISPs)
    Connectionless Packet Switching (Datagram Networks)
    Router-Based Interconnectivity
        Physical Network
        Transport Layer Protocol
        Application Layer Protocol
    Technical and Business Considerations
        Connectivity Issues
        Network Bandwidth and Latency Issues
        Wireless and Cellular
        Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
    Virtualization
    Standardization and Modularity
    Autonomic Computing
    Remote Operation and Management
    High Availability
    Security-Aware Design, Operation, and Management
    Facilities
    Computing Hardware
    Storage Hardware
    Network Hardware
        Carrier and External Networks Interconnection
        Web-Tier Load Balancing and Acceleration
        LAN Fabric
        SAN Fabric
        NAS Gateways
    Serverless Environments
    NoSQL Clustering
    Other Considerations
5.3 Modern Virtualization
    Hardware Independence
    Server Consolidation
    Resource Replication
    Operating System–Based Virtualization
    Hardware-Based Virtualization
    Containers and Application-Based Virtualization
    Virtualization Management
    Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
    REST Services
    Web Services
    Service Agents
    Service Middleware
    Web-Based RPC
5.6 Case Study Example
Chapter 6:
Understanding Containerization
6.1 Origins and Influences
    A Brief History
    Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
    Operating System Basics
    Virtualization Basics
        Physical Servers
        Virtual Servers
        Hypervisors
        Virtualization Types
    Containerization Basics
        Containers
        Container Images
        Container Engines
        Pods
        Hosts
        Host Clusters
        Host Networks and Overlay Networks
    Virtualization and Containerization
        Containerization on Physical Servers
        Containerization on Virtual Servers
        Containerization Benefits
        Containerization Risks and Challenges
6.3 Understanding Containers
    Container Hosting
    Containers and Pods
    Container Instances and Clusters
    Container Package Management
    Container Orchestration
    Container Package Manager vs. Container Orchestrator
    Container Networks
        Container Network Scope
        Container Network Addresses
    Rich Containers
    Other Common Container Characteristics
6.4 Understanding Container Images
    Container Image Types and Roles
    Container Image Immutability
    Container Image Abstraction
        Operating System Kernel Abstraction
        Operating System Abstraction Beyond the Kernel
    Container Build Files
        Container Image Layers
    How Customized Container Images Are Created
6.5 Multi-Container Types
    Sidecar Container
    Adapter Container
    Ambassador Container
    Using Multi-Containers Together
6.6 Case Study Example
Chapter 7:
Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
    Confidentiality
    Integrity
    Availability
    Authenticity
    Security Controls
    Security Mechanisms
    Security Policies
7.2 Basic Threat Terminology
    Risk
    Vulnerability
    Exploit
    Zero-Day Vulnerability
    Security Breach
    Data Breach
    Data Leak
    Threat (or Cyber Threat)
    Attack (or Cyber Attack)
    Attacker and Intruder
    Attack Vector and Surface
7.3 Threat Agents
    Anonymous Attacker
    Malicious Service Agent
    Trusted Attacker
    Malicious Insider
7.4 Common Threats
    Traffic Eavesdropping
    Malicious Intermediary
    Denial of Service
    Insufficient Authorization
    Virtualization Attack
    Overlapping Trust Boundaries
    Containerization Attack
    Malware
    Insider Threat
    Social Engineering and Phishing
    Botnet
    Privilege Escalation
    Brute Force
    Remote Code Execution
    SQL Injection
    Tunneling
    Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
    Flawed Implementations
    Security Policy Disparity
    Contracts
    Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
    Case Study Example
8.2 Virtual Server
    Case Study Example
8.3 Hypervisor
    Case Study Example
8.4 Cloud Storage Device
    Cloud Storage Levels
    Network Storage Interfaces
    Object Storage Interfaces
    Database Storage Interfaces
        Relational Data Storage
        Non-Relational Data Storage
    Case Study Example
8.5 Cloud Usage Monitor
    Monitoring Agent
    Resource Agent
    Polling Agent
    Case Study Example
8.6 Resource Replication
    Case Study Example
8.7 Ready-Made Environment
    Case Study Example
8.8 Container
Chapter 9:
Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
    Case Study Example
9.2 Load Balancer
    Case Study Example
9.3 SLA Monitor
    Case Study Example
        SLA Monitor Polling Agent
        SLA Monitoring Agent
9.4 Pay-Per-Use Monitor
    Case Study Example
9.5 Audit Monitor
    Case Study Example
9.6 Failover System
    Active–Active
    Active–Passive
    Case Study Example
9.7 Resource Cluster
    Case Study Example
9.8 Multi-Device Broker
    Case Study Example
9.9 State Management Database
    Case Study Example
Chapter 10:
Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.1 Encryption
    Symmetric Encryption
    Asymmetric Encryption
    Case Study Example
10.2 Hashing
    Case Study Example
10.3 Digital Signature
    Case Study Example
10.4 Cloud-Based Security Groups
    Case Study Example
10.5 Public Key Infrastructure (PKI) System
    Case Study Example
10.6 Single Sign-On (SSO) System
    Case Study Example
10.7 Hardened Virtual Server Image
    Case Study Example
10.8 Firewall
    Case Study Example
10.9 Virtual Private Network (VPN)
    Case Study Example
10.10 Biometric Scanner
    Case Study Example
10.11 Multi-Factor Authentication (MFA) System
    Case Study Example
10.12 Identity and Access Management (IAM) System
    Case Study Example
10.13 Intrusion Detection System (IDS)
    Case Study Example
10.14 Penetration Testing Tool
    Case Study Example
10.15 User Behavior Analytics (UBA) System
    Case Study Example
10.16 Third-Party Software Update Utility
    Case Study Example
10.17 Network Intrusion Monitor
    Case Study Example
10.18 Authentication Log Monitor
    Case Study Example
10.19 VPN Monitor
    Case Study Example
10.20 Additional Cloud Security Access-Oriented Practices and Technologies
Chapter 11:
Cloud Security and Cybersecurity Data-Oriented Mechanisms
11.1 Digital Virus Scanning and Decryption System
    Generic Decryption
    Digital Immune System
    Case Study Example
11.2 Malicious Code Analysis System
    Case Study Example
11.3 Data Loss Prevention (DLP) System
    Case Study Example
11.4 Trusted Platform Module (TPM)
    Case Study Example
11.5 Data Backup and Recovery System
    Case Study Example
11.6 Activity Log Monitor
    Case Study Example
11.7 Traffic Monitor
    Case Study Example
11.8 Data Loss Protection Monitor
    Case Study Example
Chapter 12:
Cloud Management Mechanisms
12.1 Remote Administration System
    Case Study Example
12.2 Resource Management System
    Case Study Example
12.3 SLA Management System
    Case Study Example
12.4 Billing Management System
    Case Study Example
PART III: CLOUD COMPUTING ARCHITECTURE
Chapter 13:
Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multicloud Architecture
13.10 Case Study Example
Chapter 14:
Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load-Balanced Virtual Server Instances Architecture
14.4 Nondisruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15:
Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering Architecture
15.7 Load-Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration Architecture
15.10 Redundant Physical Connection for Virtual Servers Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
15.14 Virtual Data Abstraction Architecture
15.15 Metacloud Architecture
15.16 Federated Cloud Application Architecture
PART IV: WORKING WITH CLOUDS
Chapter 16:
Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider Perspective
    Building IaaS Environments
        Data Centers
        Scalability and Reliability
        Monitoring
        Security
    Equipping PaaS Environments
        Scalability and Reliability
        Monitoring
        Security
    Optimizing SaaS Environments
        Security
16.2 Cloud Delivery Models: The Cloud Consumer Perspective
    Working with IaaS Environments
        IT Resource Provisioning Considerations
    Working with PaaS Environments
        IT Resource Provisioning Considerations
    Working with SaaS Services
16.3 Case Study Example
Chapter 17:
Cost Metrics and Pricing Models
17.1 Business Cost Metrics
    Up-Front and Ongoing Costs
    Additional Costs
Case Study Example
    Product Catalog Browser
        On-Premises Up-Front Costs
        On-Premises Ongoing Costs
        Cloud-Based Up-Front Costs
        Cloud-Based Ongoing Costs
17.2 Cloud Usage Cost Metrics
    Network Usage
        Inbound Network Usage Metric
        Outbound Network Usage Metric
        Intra-Cloud WAN Usage Metric
    Server Usage
        On-Demand Virtual Machine Instance Allocation Metric
        Reserved Virtual Machine Instance Allocation Metric
    Cloud Storage Device Usage
        On-Demand Storage Space Allocation Metric
        I/O Data Transferred Metric
    Cloud Service Usage
        Application Subscription Duration Metric
        Number of Nominated Users Metric
        Number of Transactions Users Metric
17.3 Cost Management Considerations
    Pricing Models
    Multicloud Cost Management
    Additional Considerations
Case Study Example
    Virtual Server On-Demand Instance Allocation
    Virtual Server Reserved Instance Allocation
    Cloud Storage Device
    WAN Traffic
Chapter 18:
Service Quality Metrics and SLAs
18.1 Service Quality Metrics
    Service Availability Metrics
        Availability Rate Metric
        Outage Duration Metric
    Service Reliability Metrics
        Mean Time Between Failures (MTBF) Metric
        Reliability Rate Metric
    Service Performance Metrics
        Network Capacity Metric
        Storage Device Capacity Metric
        Server Capacity Metric
        Web Application Capacity Metric
        Instance Starting Time Metric
        Response Time Metric
        Completion Time Metric
    Service Scalability Metrics
        Storage Scalability (Horizontal) Metric
        Server Scalability (Horizontal) Metric
        Server Scalability (Vertical) Metric
    Service Resiliency Metrics
        Mean Time to Switchover (MTSO) Metric
        Mean Time to System Recovery (MTSR) Metric
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
        Scope and Applicability
        Service Quality Guarantees
        Definitions
        Usage of Financial Credits
        SLA Exclusions
PART V: APPENDICES
Appendix A:
Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B:
Common Containerization Technologies
B.1 Docker
    Docker Server
    Docker Client
    Docker Registry
    Docker Objects
    Docker Swarm (Container Orchestrator)
B.2 Kubernetes
    Kubernetes Node (Host)
    Kubernetes Pod
    Kubelet
    Kube-Proxy
    Container Runtime (Container Engine)
    Cluster
    Kubernetes Control Plane


9780138052256    TOC    7/17/2023

TỔNG QUAN SÁCH

Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúc

Điện toán đám mây đã trở thành một phần không thể thiếu và nền tảng của công nghệ thông tin. Phần lớn hoạt động kinh doanh kỹ thuật số và đổi mới công nghệ diễn ra với sự tham gia của môi trường đám mây hiện đại, nơi cung cấp cơ sở hạ tầng công nghệ tự động hóa rất phức tạp và một loạt tài nguyên công nghệ. Để xây dựng, tương tác hoặc tạo thành công môi trường đám mây đòi hỏi sự hiểu biết về cơ chế bên trong, các lớp kiến ​​trúc, mô hình và kiểm soát bảo mật chung của nó. Nó cũng đòi hỏi sự hiểu biết về các yếu tố kinh tế và kinh doanh chứng minh cho việc áp dụng và sử dụng đám mây cũng như các sản phẩm và dịch vụ dựa trên đám mây trong thế giới thực.

Trong Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúc, Thomas Erl, một trong những tác giả CNTT bán chạy nhất thế giới, hợp tác với chuyên gia điện toán đám mây Eric Barceló Monroy và các nhà nghiên cứu để chia nhỏ các công nghệ và thực tiễn điện toán đám mây đã được chứng minh và trưởng thành thành một chuỗi các khái niệm, cơ chế công nghệ và kiến ​​trúc công nghệ được xác định rõ ràng. Nội dung bao gồm toàn diện về các chủ đề về container hóa và an ninh mạng.

Tất cả các chương đều được biên soạn cẩn thận theo quan điểm lấy ngành làm trung tâm và trung lập với nhà cung cấp. Khi làm như vậy, cuốn sách thiết lập nội dung cụ thể, mang tính học thuật, tập trung vào cấu trúc, sự rõ ràng và các khối xây dựng được xác định rõ ràng cho các nền tảng và giải pháp điện toán đám mây và container hóa chính thống. Với gần 370 hình vẽ, 40 mô hình kiến ​​trúc và 50 cơ chế, hướng dẫn không thể thiếu này cung cấp kiến ​​thức toàn diện về điện toán đám mây, container hóa và an ninh mạng hiện đại sẽ không bao giờ rời xa bạn.

MỤC LỤC

Foreword
About the Authors
Acknowledgments
Chapter 1:
Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
    Part I: Fundamental Cloud Computing
        Chapter 3: Understanding Cloud Computing
        Chapter 4: Fundamental Concepts and Models
        Chapter 5: Cloud-Enabling Technology
        Chapter 6: Understanding Containerization
        Chapter 7: Understanding Cloud Security and Cybersecurity
    Part II: Cloud Computing Mechanisms
        Chapter 8: Cloud Infrastructure Mechanisms
        Chapter 9: Specialized Cloud Mechanisms
        Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
        Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
        Chapter 12: Cloud Management Mechanisms
    Part III: Cloud Computing Architecture
        Chapter 13: Fundamental Cloud Architectures
        Chapter 14: Advanced Cloud Architectures
        Chapter 15: Specialized Cloud Architectures
    Part IV: Working with Clouds
        Chapter 16: Cloud Delivery Model Considerations
        Chapter 17: Cost Metrics and Pricing Models
        Chapter 18: Service Quality Metrics and SLAs
    Part V: Appendices
        Appendix A: Case Study Conclusions
        Appendix B: Common Containerization Technologies
1.5 Resources
    Pearson Digital Enterprise Book Series
    Thomas Erl on YouTube
        The Digital Enterprise Newsletter on LinkedIn
    Cloud Certified Professional (CCP) Program
Chapter 2:
Case Study Background
2.1 Case Study #1: ATN
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
    Technical Infrastructure and Environment
    Business Goals and Strategy
    Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
    A Brief History
    Definitions
    Business Drivers
        Cost Reduction
        Business Agility
    Technology Innovations
        Clustering
        Grid Computing
        Capacity Planning
        Virtualization
        Containerization
        Serverless Environments
3.2 Basic Concepts and Terminology
    Cloud
    Container
    IT Resource
    On Premises
    Cloud Consumers and Cloud Providers
    Scaling
        Horizontal Scaling
        Vertical Scaling
    Cloud Service
    Cloud Service Consumer
3.3 Goals and Benefits
    Increased Responsiveness
    Reduced Investments and Proportional Costs
    Increased Scalability
    Increased Availability and Reliability
3.4 Risks and Challenges
    Increased Vulnerability Due to Overlapping Trust Boundaries
    Increased Vulnerability Due to Shared Security Responsibility
    Increased Exposure to Cyber Threats
    Reduced Operational Governance Control
    Limited Portability Between Cloud Providers
    Multiregional Compliance and Legal Issues
    Cost Overruns
Chapter 4:
Fundamental Concepts and Models
4.1 Roles and Boundaries
    Cloud Provider
    Cloud Consumer
    Cloud Broker
    Cloud Service Owner
    Cloud Resource Administrator
    Additional Roles
    Organizational Boundary
    Trust Boundary
4.2 Cloud Characteristics
    On-Demand Usage
    Ubiquitous Access
    Multitenancy (and Resource Pooling)
    Elasticity
    Measured Usage
    Resiliency
4.3 Cloud Delivery Models
    Infrastructure as a Service (IaaS)
    Platform as a Service (PaaS)
    Software as a Service (SaaS)
    Comparing Cloud Delivery Models
    Combining Cloud Delivery Models
        IaaS + PaaS
        IaaS + PaaS + SaaS
    Cloud Delivery Submodels
4.4 Cloud Deployment Models
    Public Clouds
    Private Clouds
    Multiclouds
    Hybrid Clouds
Chapter 5:
Cloud-Enabling Technology
5.1 Networks and Internet Architecture
    Internet Service Providers (ISPs)
    Connectionless Packet Switching (Datagram Networks)
    Router-Based Interconnectivity
        Physical Network
        Transport Layer Protocol
        Application Layer Protocol
    Technical and Business Considerations
        Connectivity Issues
        Network Bandwidth and Latency Issues
        Wireless and Cellular
        Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
    Virtualization
    Standardization and Modularity
    Autonomic Computing
    Remote Operation and Management
    High Availability
    Security-Aware Design, Operation, and Management
    Facilities
    Computing Hardware
    Storage Hardware
    Network Hardware
        Carrier and External Networks Interconnection
        Web-Tier Load Balancing and Acceleration
        LAN Fabric
        SAN Fabric
        NAS Gateways
    Serverless Environments
    NoSQL Clustering
    Other Considerations
5.3 Modern Virtualization
    Hardware Independence
    Server Consolidation
    Resource Replication
    Operating System–Based Virtualization
    Hardware-Based Virtualization
    Containers and Application-Based Virtualization
    Virtualization Management
    Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
    REST Services
    Web Services
    Service Agents
    Service Middleware
    Web-Based RPC
5.6 Case Study Example
Chapter 6:
Understanding Containerization
6.1 Origins and Influences
    A Brief History
    Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
    Operating System Basics
    Virtualization Basics
        Physical Servers
        Virtual Servers
        Hypervisors
        Virtualization Types
    Containerization Basics
        Containers
        Container Images
        Container Engines
        Pods
        Hosts
        Host Clusters
        Host Networks and Overlay Networks
    Virtualization and Containerization
        Containerization on Physical Servers
        Containerization on Virtual Servers
        Containerization Benefits
        Containerization Risks and Challenges
6.3 Understanding Containers
    Container Hosting
    Containers and Pods
    Container Instances and Clusters
    Container Package Management
    Container Orchestration
    Container Package Manager vs. Container Orchestrator
    Container Networks
        Container Network Scope
        Container Network Addresses
    Rich Containers
    Other Common Container Characteristics
6.4 Understanding Container Images
    Container Image Types and Roles
    Container Image Immutability
    Container Image Abstraction
        Operating System Kernel Abstraction
        Operating System Abstraction Beyond the Kernel
    Container Build Files
        Container Image Layers
    How Customized Container Images Are Created
6.5 Multi-Container Types
    Sidecar Container
    Adapter Container
    Ambassador Container
    Using Multi-Containers Together
6.6 Case Study Example
Chapter 7:
Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
    Confidentiality
    Integrity
    Availability
    Authenticity
    Security Controls
    Security Mechanisms
    Security Policies
7.2 Basic Threat Terminology
    Risk
    Vulnerability
    Exploit
    Zero-Day Vulnerability
    Security Breach
    Data Breach
    Data Leak
    Threat (or Cyber Threat)
    Attack (or Cyber Attack)
    Attacker and Intruder
    Attack Vector and Surface
7.3 Threat Agents
    Anonymous Attacker
    Malicious Service Agent
    Trusted Attacker
    Malicious Insider
7.4 Common Threats
    Traffic Eavesdropping
    Malicious Intermediary
    Denial of Service
    Insufficient Authorization
    Virtualization Attack
    Overlapping Trust Boundaries
    Containerization Attack
    Malware
    Insider Threat
    Social Engineering and Phishing
    Botnet
    Privilege Escalation
    Brute Force
    Remote Code Execution
    SQL Injection
    Tunneling
    Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
    Flawed Implementations
    Security Policy Disparity
    Contracts
    Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
    Case Study Example
8.2 Virtual Server
    Case Study Example
8.3 Hypervisor
    Case Study Example
8.4 Cloud Storage Device
    Cloud Storage Levels
    Network Storage Interfaces
    Object Storage Interfaces
    Database Storage Interfaces
        Relational Data Storage
        Non-Relational Data Storage
    Case Study Example
8.5 Cloud Usage Monitor
    Monitoring Agent
    Resource Agent
    Polling Agent
    Case Study Example
8.6 Resource Replication
    Case Study Example
8.7 Ready-Made Environment
    Case Study Example
8.8 Container
Chapter 9:
Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
    Case Study Example
9.2 Load Balancer
    Case Study Example
9.3 SLA Monitor
    Case Study Example
        SLA Monitor Polling Agent
        SLA Monitoring Agent
9.4 Pay-Per-Use Monitor
    Case Study Example
9.5 Audit Monitor
    Case Study Example
9.6 Failover System
    Active–Active
    Active–Passive
    Case Study Example
9.7 Resource Cluster
    Case Study Example
9.8 Multi-Device Broker
    Case Study Example
9.9 State Management Database
    Case Study Example
Chapter 10:
Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.1 Encryption
    Symmetric Encryption
    Asymmetric Encryption
    Case Study Example
10.2 Hashing
    Case Study Example
10.3 Digital Signature
    Case Study Example
10.4 Cloud-Based Security Groups
    Case Study Example
10.5 Public Key Infrastructure (PKI) System
    Case Study Example
10.6 Single Sign-On (SSO) System
    Case Study Example
10.7 Hardened Virtual Server Image
    Case Study Example
10.8 Firewall
    Case Study Example
10.9 Virtual Private Network (VPN)
    Case Study Example
10.10 Biometric Scanner
    Case Study Example
10.11 Multi-Factor Authentication (MFA) System
    Case Study Example
10.12 Identity and Access Management (IAM) System
    Case Study Example
10.13 Intrusion Detection System (IDS)
    Case Study Example
10.14 Penetration Testing Tool
    Case Study Example
10.15 User Behavior Analytics (UBA) System
    Case Study Example
10.16 Third-Party Software Update Utility
    Case Study Example
10.17 Network Intrusion Monitor
    Case Study Example
10.18 Authentication Log Monitor
    Case Study Example
10.19 VPN Monitor
    Case Study Example
10.20 Additional Cloud Security Access-Oriented Practices and Technologies
Chapter 11:
Cloud Security and Cybersecurity Data-Oriented Mechanisms
11.1 Digital Virus Scanning and Decryption System
    Generic Decryption
    Digital Immune System
    Case Study Example
11.2 Malicious Code Analysis System
    Case Study Example
11.3 Data Loss Prevention (DLP) System
    Case Study Example
11.4 Trusted Platform Module (TPM)
    Case Study Example
11.5 Data Backup and Recovery System
    Case Study Example
11.6 Activity Log Monitor
    Case Study Example
11.7 Traffic Monitor
    Case Study Example
11.8 Data Loss Protection Monitor
    Case Study Example
Chapter 12:
Cloud Management Mechanisms
12.1 Remote Administration System
    Case Study Example
12.2 Resource Management System
    Case Study Example
12.3 SLA Management System
    Case Study Example
12.4 Billing Management System
    Case Study Example
PART III: CLOUD COMPUTING ARCHITECTURE
Chapter 13:
Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multicloud Architecture
13.10 Case Study Example
Chapter 14:
Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load-Balanced Virtual Server Instances Architecture
14.4 Nondisruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15:
Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering Architecture
15.7 Load-Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration Architecture
15.10 Redundant Physical Connection for Virtual Servers Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
15.14 Virtual Data Abstraction Architecture
15.15 Metacloud Architecture
15.16 Federated Cloud Application Architecture
PART IV: WORKING WITH CLOUDS
Chapter 16:
Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider Perspective
    Building IaaS Environments
        Data Centers
        Scalability and Reliability
        Monitoring
        Security
    Equipping PaaS Environments
        Scalability and Reliability
        Monitoring
        Security
    Optimizing SaaS Environments
        Security
16.2 Cloud Delivery Models: The Cloud Consumer Perspective
    Working with IaaS Environments
        IT Resource Provisioning Considerations
    Working with PaaS Environments
        IT Resource Provisioning Considerations
    Working with SaaS Services
16.3 Case Study Example
Chapter 17:
Cost Metrics and Pricing Models
17.1 Business Cost Metrics
    Up-Front and Ongoing Costs
    Additional Costs
Case Study Example
    Product Catalog Browser
        On-Premises Up-Front Costs
        On-Premises Ongoing Costs
        Cloud-Based Up-Front Costs
        Cloud-Based Ongoing Costs
17.2 Cloud Usage Cost Metrics
    Network Usage
        Inbound Network Usage Metric
        Outbound Network Usage Metric
        Intra-Cloud WAN Usage Metric
    Server Usage
        On-Demand Virtual Machine Instance Allocation Metric
        Reserved Virtual Machine Instance Allocation Metric
    Cloud Storage Device Usage
        On-Demand Storage Space Allocation Metric
        I/O Data Transferred Metric
    Cloud Service Usage
        Application Subscription Duration Metric
        Number of Nominated Users Metric
        Number of Transactions Users Metric
17.3 Cost Management Considerations
    Pricing Models
    Multicloud Cost Management
    Additional Considerations
Case Study Example
    Virtual Server On-Demand Instance Allocation
    Virtual Server Reserved Instance Allocation
    Cloud Storage Device
    WAN Traffic
Chapter 18:
Service Quality Metrics and SLAs
18.1 Service Quality Metrics
    Service Availability Metrics
        Availability Rate Metric
        Outage Duration Metric
    Service Reliability Metrics
        Mean Time Between Failures (MTBF) Metric
        Reliability Rate Metric
    Service Performance Metrics
        Network Capacity Metric
        Storage Device Capacity Metric
        Server Capacity Metric
        Web Application Capacity Metric
        Instance Starting Time Metric
        Response Time Metric
        Completion Time Metric
    Service Scalability Metrics
        Storage Scalability (Horizontal) Metric
        Server Scalability (Horizontal) Metric
        Server Scalability (Vertical) Metric
    Service Resiliency Metrics
        Mean Time to Switchover (MTSO) Metric
        Mean Time to System Recovery (MTSR) Metric
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
        Scope and Applicability
        Service Quality Guarantees
        Definitions
        Usage of Financial Credits
        SLA Exclusions
PART V: APPENDICES
Appendix A:
Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B:
Common Containerization Technologies
B.1 Docker
    Docker Server
    Docker Client
    Docker Registry
    Docker Objects
    Docker Swarm (Container Orchestrator)
B.2 Kubernetes
    Kubernetes Node (Host)
    Kubernetes Pod
    Kubelet
    Kube-Proxy
    Container Runtime (Container Engine)
    Cluster
    Kubernetes Control Plane


9780138052256    TOC    7/17/2023

-%
0₫ 0₫
0915920514
0915920514