
Cloud Computing: Concepts, Technology, and Architecture, Second Edition, 2nd edition
BRAND: PEARSON
eBook edition. 1 Year Subscription. Dành cho Cá nhân | Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In
Tổng quan sách
Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúcĐiện toán đám mây đã trở thành một phần không thể thiếu và nền tảng của công nghệ thông tin. Phần lớn hoạt động kinh doanh kỹ thuật số và đổi mới công nghệ diễn ra với sự tham gia của môi trường đám mây hiện đại, nơi cung cấp cơ sở hạ tầng công nghệ tự động hóa rất phức tạp và một loạt tài nguyên công nghệ. Để xây dựng, tương tác hoặc tạo thành công môi trường đám mây đòi hỏi sự hiểu biết về cơ chế bên trong, các lớp kiến trúc, mô hình và kiểm soát bảo mật chung của nó. Nó cũng đòi hỏi sự hiểu biết về các yếu tố kinh tế và kinh doanh chứng minh cho việc áp dụng và sử dụng đám mây cũng như các sản phẩm và dịch vụ dựa trên đám mây trong thế giới thực.Trong Điện toán đám mây: Khái niệm, Công nghệ, Bảo mật & Kiến trúc, Thomas Erl, một trong những tác giả CNTT bán chạy nhất thế giới, hợp tác với chuyên gia điện toán đám mây Eric Barceló Monroy và các nhà nghiên cứu để chia nhỏ các công nghệ và thực tiễn điện toán đám mây đã được chứng minh và trưởng thành thành một chuỗi các khái niệm, cơ chế công nghệ và kiến trúc công nghệ được xác định rõ ràng. Nội dung bao gồm toàn diện về các chủ đề về container hóa và an ninh mạng.Tất cả các chương đều được biên soạn cẩn thận theo quan điểm lấy ngành làm trung tâm và trung lập với nhà cung cấp. Khi làm như vậy, cuốn sách thiết lập nội dung cụ thể, mang tính học thuật, tập trung vào cấu trúc, sự rõ ràng và các khối xây dựng được xác định rõ ràng cho các nền tảng và giải pháp điện toán đám mây và container hóa chính thống. Với gần 370 hình vẽ, 40 mô hình kiến trúc và 50 cơ chế, hướng dẫn không thể thiếu này cung cấp kiến thức toàn diện về điện toán đám mây, container hóa và an ninh mạng hiện đại sẽ không bao giờ rời xa bạn.
- ForewordAbout the AuthorsAcknowledgments
- Chapter 1:Introduction1.1 Objectives of This Book1.2 What This Book Does Not Cover1.3 Who This Book Is For1.4 How This Book Is Organized Part I: Fundamental Cloud Computing
- Chapter 3: Understanding Cloud Computing
- Chapter 4: Fundamental Concepts and Models
- Chapter 5: Cloud-Enabling Technology
- Chapter 6: Understanding Containerization
- Chapter 7: Understanding Cloud Security and Cybersecurity Part II: Cloud Computing Mechanisms
- Chapter 8: Cloud Infrastructure Mechanisms
- Chapter 9: Specialized Cloud Mechanisms
- Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
- Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
- Chapter 12: Cloud Management Mechanisms Part III: Cloud Computing Architecture
- Chapter 13: Fundamental Cloud Architectures
- Chapter 14: Advanced Cloud Architectures
- Chapter 15: Specialized Cloud Architectures Part IV: Working with Clouds
- Chapter 16: Cloud Delivery Model Considerations
- Chapter 17: Cost Metrics and Pricing Models
- Chapter 18: Service Quality Metrics and SLAs Part V: Appendices Appendix A: Case Study Conclusions Appendix B: Common Containerization Technologies1.5 Resources Pearson Digital Enterprise Book Series Thomas Erl on YouTube The Digital Enterprise Newsletter on LinkedIn Cloud Certified Professional (CCP) Program
- Chapter 2:Case Study Background2.1 Case Study #1: ATN Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy2.2 Case Study #2: DTGOV Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy2.3 Case Study #3: Innovartus Technologies Inc. Technical Infrastructure and Environment Business Goals and Strategy Roadmap and Implementation StrategyPART I: FUNDAMENTAL CLOUD COMPUTING
- Chapter 3: Understanding Cloud Computing3.1 Origins and Influences A Brief History Definitions Business Drivers Cost Reduction Business Agility Technology Innovations Clustering Grid Computing Capacity Planning Virtualization Containerization Serverless Environments3.2 Basic Concepts and Terminology Cloud Container IT Resource On Premises Cloud Consumers and Cloud Providers Scaling Horizontal Scaling Vertical Scaling Cloud Service Cloud Service Consumer3.3 Goals and Benefits Increased Responsiveness Reduced Investments and Proportional Costs Increased Scalability Increased Availability and Reliability3.4 Risks and Challenges Increased Vulnerability Due to Overlapping Trust Boundaries Increased Vulnerability Due to Shared Security Responsibility Increased Exposure to Cyber Threats Reduced Operational Governance Control Limited Portability Between Cloud Providers Multiregional Compliance and Legal Issues Cost Overruns
- Chapter 4:Fundamental Concepts and Models4.1 Roles and Boundaries Cloud Provider Cloud Consumer Cloud Broker Cloud Service Owner Cloud Resource Administrator Additional Roles Organizational Boundary Trust Boundary4.2 Cloud Characteristics On-Demand Usage Ubiquitous Access Multitenancy (and Resource Pooling) Elasticity Measured Usage Resiliency4.3 Cloud Delivery Models Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Comparing Cloud Delivery Models Combining Cloud Delivery Models IaaS + PaaS IaaS + PaaS + SaaS Cloud Delivery Submodels4.4 Cloud Deployment Models Public Clouds Private Clouds Multiclouds Hybrid Clouds
- Chapter 5:Cloud-Enabling Technology5.1 Networks and Internet Architecture Internet Service Providers (ISPs) Connectionless Packet Switching (Datagram Networks) Router-Based Interconnectivity Physical Network Transport Layer Protocol Application Layer Protocol Technical and Business Considerations Connectivity Issues Network Bandwidth and Latency Issues Wireless and Cellular Cloud Carrier and Cloud Provider Selection5.2 Cloud Data Center Technology Virtualization Standardization and Modularity Autonomic Computing Remote Operation and Management High Availability Security-Aware Design, Operation, and Management Facilities Computing Hardware Storage Hardware Network Hardware Carrier and External Networks Interconnection Web-Tier Load Balancing and Acceleration LAN Fabric SAN Fabric NAS Gateways Serverless Environments NoSQL Clustering Other Considerations5.3 Modern Virtualization Hardware Independence Server Consolidation Resource Replication Operating System–Based Virtualization Hardware-Based Virtualization Containers and Application-Based Virtualization Virtualization Management Other Considerations5.4 Multitenant Technology5.5 Service Technology and Service APIs REST Services Web Services Service Agents Service Middleware Web-Based RPC5.6 Case Study Example
- Chapter 6:Understanding Containerization6.1 Origins and Influences A Brief History Containerization and Cloud Computing6.2 Fundamental Virtualization and Containerization Operating System Basics Virtualization Basics Physical Servers Virtual Servers Hypervisors Virtualization Types Containerization Basics Containers Container Images Container Engines Pods Hosts Host Clusters Host Networks and Overlay Networks Virtualization and Containerization Containerization on Physical Servers Containerization on Virtual Servers Containerization Benefits Containerization Risks and Challenges6.3 Understanding Containers Container Hosting Containers and Pods Container Instances and Clusters Container Package Management Container Orchestration Container Package Manager vs. Container Orchestrator Container Networks Container Network Scope Container Network Addresses Rich Containers Other Common Container Characteristics6.4 Understanding Container Images Container Image Types and Roles Container Image Immutability Container Image Abstraction Operating System Kernel Abstraction Operating System Abstraction Beyond the Kernel Container Build Files Container Image Layers How Customized Container Images Are Created6.5 Multi-Container Types Sidecar Container Adapter Container Ambassador Container Using Multi-Containers Together6.6 Case Study Example
- Chapter 7:Understanding Cloud Security and Cybersecurity7.1 Basic Security Terminology Confidentiality Integrity Availability Authenticity Security Controls Security Mechanisms Security Policies7.2 Basic Threat Terminology Risk Vulnerability Exploit Zero-Day Vulnerability Security Breach Data Breach Data Leak Threat (or Cyber Threat) Attack (or Cyber Attack) Attacker and Intruder Attack Vector and Surface7.3 Threat Agents Anonymous Attacker Malicious Service Agent Trusted Attacker Malicious Insider7.4 Common Threats Traffic Eavesdropping Malicious Intermediary Denial of Service Insufficient Authorization Virtualization Attack Overlapping Trust Boundaries Containerization Attack Malware Insider Threat Social Engineering and Phishing Botnet Privilege Escalation Brute Force Remote Code Execution SQL Injection Tunneling Advanced Persistent Threat (APT)7.5 Case Study Example7.6 Additional Considerations Flawed Implementations Security Policy Disparity Contracts Risk Management7.7 Case Study ExamplePART II: CLOUD COMPUTING MECHANISMS
- Chapter 8:Cloud Infrastructure Mechanisms8.1 Logical Network Perimeter Case Study Example8.2 Virtual Server Case Study Example8.3 Hypervisor Case Study Example8.4 Cloud Storage Device Cloud Storage Levels Network Storage Interfaces Object Storage Interfaces Database Storage Interfaces Relational Data Storage Non-Relational Data Storage Case Study Example8.5 Cloud Usage Monitor Monitoring Agent Resource Agent Polling Agent Case Study Example8.6 Resource Replication Case Study Example8.7 Ready-Made Environment Case Study Example8.8 Container
- Chapter 9:Specialized Cloud Mechanisms9.1 Automated Scaling Listener Case Study Example9.2 Load Balancer Case Study Example9.3 SLA Monitor Case Study Example SLA Monitor Polling Agent SLA Monitoring Agent9.4 Pay-Per-Use Monitor Case Study Example9.5 Audit Monitor Case Study Example9.6 Failover System Active–Active Active–Passive Case Study Example9.7 Resource Cluster Case Study Example9.8 Multi-Device Broker Case Study Example9.9 State Management Database Case Study Example
- Chapter 10:Cloud Security and Cybersecurity Access-Oriented Mechanisms10.1 Encryption Symmetric Encryption Asymmetric Encryption Case Study Example10.2 Hashing Case Study Example10.3 Digital Signature Case Study Example10.4 Cloud-Based Security Groups Case Study Example10.5 Public Key Infrastructure (PKI) System Case Study Example10.6 Single Sign-On (SSO) System Case Study Example10.7 Hardened Virtual Server Image Case Study Example10.8 Firewall Case Study Example10.9 Virtual Private Network (VPN) Case Study Example10.10 Biometric Scanner Case Study Example10.11 Multi-Factor Authentication (MFA) System Case Study Example10.12 Identity and Access Management (IAM) System Case Study Example10.13 Intrusion Detection System (IDS) Case Study Example10.14 Penetration Testing Tool Case Study Example10.15 User Behavior Analytics (UBA) System Case Study Example10.16 Third-Party Software Update Utility Case Study Example10.17 Network Intrusion Monitor Case Study Example10.18 Authentication Log Monitor Case Study Example10.19 VPN Monitor Case Study Example10.20 Additional Cloud Security Access-Oriented Practices and Technologies
- Chapter 11:Cloud Security and Cybersecurity Data-Oriented Mechanisms11.1 Digital Virus Scanning and Decryption System Generic Decryption Digital Immune System Case Study Example11.2 Malicious Code Analysis System Case Study Example11.3 Data Loss Prevention (DLP) System Case Study Example11.4 Trusted Platform Module (TPM) Case Study Example11.5 Data Backup and Recovery System Case Study Example11.6 Activity Log Monitor Case Study Example11.7 Traffic Monitor Case Study Example11.8 Data Loss Protection Monitor Case Study Example
- Chapter 12:Cloud Management Mechanisms12.1 Remote Administration System Case Study Example12.2 Resource Management System Case Study Example12.3 SLA Management System Case Study Example12.4 Billing Management System Case Study ExamplePART III: CLOUD COMPUTING ARCHITECTURE
- Chapter 13:Fundamental Cloud Architectures13.1 Workload Distribution Architecture13.2 Resource Pooling Architecture13.3 Dynamic Scalability Architecture13.4 Elastic Resource Capacity Architecture13.5 Service Load Balancing Architecture13.6 Cloud Bursting Architecture13.7 Elastic Disk Provisioning Architecture13.8 Redundant Storage Architecture13.9 Multicloud Architecture13.10 Case Study Example
- Chapter 14:Advanced Cloud Architectures14.1 Hypervisor Clustering Architecture14.2 Virtual Server Clustering Architecture14.3 Load-Balanced Virtual Server Instances Architecture14.4 Nondisruptive Service Relocation Architecture14.5 Zero Downtime Architecture14.6 Cloud Balancing Architecture14.7 Resilient Disaster Recovery Architecture14.8 Distributed Data Sovereignty Architecture14.9 Resource Reservation Architecture14.10 Dynamic Failure Detection and Recovery Architecture14.11 Rapid Provisioning Architecture14.12 Storage Workload Management Architecture14.13 Virtual Private Cloud Architecture14.14 Case Study Example
- Chapter 15:Specialized Cloud Architectures15.1 Direct I/O Access Architecture15.2 Direct LUN Access Architecture15.3 Dynamic Data Normalization Architecture15.4 Elastic Network Capacity Architecture15.5 Cross-Storage Device Vertical Tiering Architecture15.6 Intra-Storage Device Vertical Data Tiering Architecture15.7 Load-Balanced Virtual Switches Architecture15.8 Multipath Resource Access Architecture15.9 Persistent Virtual Network Configuration Architecture15.10 Redundant Physical Connection for Virtual Servers Architecture15.11 Storage Maintenance Window Architecture15.12 Edge Computing Architecture15.13 Fog Computing Architecture15.14 Virtual Data Abstraction Architecture15.15 Metacloud Architecture15.16 Federated Cloud Application ArchitecturePART IV: WORKING WITH CLOUDS
- Chapter 16:Cloud Delivery Model Considerations16.1 Cloud Delivery Models: The Cloud Provider Perspective Building IaaS Environments Data Centers Scalability and Reliability Monitoring Security Equipping PaaS Environments Scalability and Reliability Monitoring Security Optimizing SaaS Environments Security16.2 Cloud Delivery Models: The Cloud Consumer Perspective Working with IaaS Environments IT Resource Provisioning Considerations Working with PaaS Environments IT Resource Provisioning Considerations Working with SaaS Services16.3 Case Study Example
- Chapter 17:Cost Metrics and Pricing Models17.1 Business Cost Metrics Up-Front and Ongoing Costs Additional CostsCase Study Example Product Catalog Browser On-Premises Up-Front Costs On-Premises Ongoing Costs Cloud-Based Up-Front Costs Cloud-Based Ongoing Costs17.2 Cloud Usage Cost Metrics Network Usage Inbound Network Usage Metric Outbound Network Usage Metric Intra-Cloud WAN Usage Metric Server Usage On-Demand Virtual Machine Instance Allocation Metric Reserved Virtual Machine Instance Allocation Metric Cloud Storage Device Usage On-Demand Storage Space Allocation Metric I/O Data Transferred Metric Cloud Service Usage Application Subscription Duration Metric Number of Nominated Users Metric Number of Transactions Users Metric17.3 Cost Management Considerations Pricing Models Multicloud Cost Management Additional ConsiderationsCase Study Example Virtual Server On-Demand Instance Allocation Virtual Server Reserved Instance Allocation Cloud Storage Device WAN Traffic
- Chapter 18:Service Quality Metrics and SLAs18.1 Service Quality Metrics Service Availability Metrics Availability Rate Metric Outage Duration Metric Service Reliability Metrics Mean Time Between Failures (MTBF) Metric Reliability Rate Metric Service Performance Metrics Network Capacity Metric Storage Device Capacity Metric Server Capacity Metric Web Application Capacity Metric Instance Starting Time Metric Response Time Metric Completion Time Metric Service Scalability Metrics Storage Scalability (Horizontal) Metric Server Scalability (Horizontal) Metric Server Scalability (Vertical) Metric Service Resiliency Metrics Mean Time to Switchover (MTSO) Metric Mean Time to System Recovery (MTSR) Metric18.2 Case Study Example18.3 SLA Guidelines18.4 Case Study Example Scope and Applicability Service Quality Guarantees Definitions Usage of Financial Credits SLA ExclusionsPART V: APPENDICESAppendix A:Case Study ConclusionsA.1 ATNA.2 DTGOVA.3 InnovartusAppendix B:Common Containerization TechnologiesB.1 Docker Docker Server Docker Client Docker Registry Docker Objects Docker Swarm (Container Orchestrator)B.2 Kubernetes Kubernetes Node (Host) Kubernetes Pod Kubelet Kube-Proxy Container Runtime (Container Engine) Cluster Kubernetes Control Plane9780138052256 TOC 7/17/2023