Электронная книга: Imad Abbadi M. «Cloud Management and Security»

Cloud Management and Security

Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzingCloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting theCloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem – focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security. Key Features • Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security • Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students • Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice • Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages • Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing • Provides a research roadmap to establish next-generation trustworthy Cloud computing • Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Издательство: "John Wiley&Sons Limited"

ISBN: 9781118817063

электронная книга

Купить за 8416.9 руб и скачать на Litres

Другие книги схожей тематики:

АвторКнигаОписаниеГодЦенаТип книги
Igor FaynbergCloud Computing. Business Trends and TechnologiesCloud Computing: Business Trends and Technologies provides a broad introduction to Cloud computing technologies and their applications to IT and telecommunications businesses (i.e., the network… — John Wiley&Sons Limited, Подробнее...
6593.45электронная книга
Robert Smallwood F.Information Governance. Concepts, Strategies, and Best PracticesProven and emerging strategies for addressing document and records management risk within the framework of information governance principles and best practices Information Governance (IG) is a… — John Wiley&Sons Limited (USD), Подробнее...
5203.16электронная книга
Michael GreggCASP CompTIA Advanced Security Practitioner Study Guide. Exam CAS-002CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the… — John Wiley&Sons Limited (USD), Подробнее...
3901.72электронная книга
EMC Services EducationInformation Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud EnvironmentsThe new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage… — John Wiley&Sons Limited, Подробнее...
5463.32электронная книга
Robert Smallwood F.Managing Electronic Records. Methods, Best Practices, and TechnologiesThe ultimate guide to electronic records management, featuring a collaboration of expert practitioners including over 400 cited references documenting today's global trends, standards, and best… — John Wiley&Sons Limited (USD), Подробнее...
11381.91электронная книга
Keith HannaMastering Skype for Business 2015Authoritative, hands-on guidance for Skype Business administrators Mastering Skype for Business 2015 gives administrators the comprehensive coverage they need to effectively utilize Skype for… — John Wiley&Sons Limited (USD), Подробнее...
3902.37электронная книга
Rob TidrowWindows 10 BibleA complete, detailed Windows 10 reference for beginners and power users alike Windows 10 Bible is one of the most thorough references on the market with complete coverage of Windows 10. Whether… — John Wiley&Sons Limited (USD), Подробнее...
3251.32электронная книга
Chris RuelOracle 12c For DummiesDemystifying the power of the Oracle 12c database The Oracle database is the industry-leading relational database management system (RDMS) used from small companies to the world’s largest enterprises… — John Wiley&Sons Limited (USD), Подробнее...
2275.73электронная книга
Brian KnightProfessional Microsoft SQL Server 2014 AdministrationLearn to take advantage of the opportunities offered by SQL Server 2014 Microsoft's SQL Server 2014 update means big changes for database administrators, and you need to get up to speed quickly… — John Wiley&Sons Limited (USD), Подробнее...
3576.52электронная книга
Jonathan RodriguezFundamentals of 5G Mobile NetworksFundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks, discussing the motivation for 5G and the main challenges in developing this new… — John Wiley&Sons Limited, Подробнее...
9652.07электронная книга
Mike ChappleCompTIA PenTest+ Study Guide. Exam PT0-001World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the newest intermediate cybersecurity certification exam. With… — John Wiley&Sons Limited (USD), Подробнее...
4682.84электронная книга
Bob LeVitusmacOS High Sierra For DummiesWork, play, connect, and share with the ultimate tour to macOS'X'macOS'X'For Dummies is the ultimate tour guide to the Mac operating system, written by Bob«Dr. Mac» LeVitus himself! Whether you're… — John Wiley&Sons Limited (USD), Подробнее...
1950.53электронная книга

Look at other dictionaries:

  • Cloud computing — logical diagram Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a… …   Wikipedia

  • Cloud computing security — (sometimes referred to simply as cloud security ) is an evolving sub domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data …   Wikipedia

  • Cloud.com — Developer(s) Cloud.com, Inc. Initial release 2.0 2010 05 4[1] Stable release …   Wikipedia

  • Cloud Computing Manifesto — The Cloud Computing Manifesto is a manifesto containing a public declaration of principles and intentions for cloud computing providers and vendors[1], annotated as a call to action for the worldwide cloud community and dedicated belief that the… …   Wikipedia

  • Cloud Data Management Interface — (CDMI) determines what interface will be utilized to access and manage cloud storage.[1] The Cloud Data Management Interface defines the functional interface that applications will use to create, retrieve, update and delete data elements from the …   Wikipedia

  • Cloud testing — is a form of software testing in which web applications use cloud computing environments (a cloud ) to simulate real world user traffic. Contents 1 Overview 2 Need for Cloud testing 2.1 Causes of performance degradation …   Wikipedia

  • Cloud Computing — Abstrahierter Wolkenumriss umschließt Namen in Ellipsen von Cloud Computing Diensteanbietern. Cloud Computing (selten auch: Rechnerwolke) umschreibt den Ansatz, abstrahierte IT Infrastrukturen (z. B. Rechenkapazität, Datenspeicher,… …   Deutsch Wikipedia

  • Network and Management Laboratory — Networks and Management Laboratory NML (in Portuguese language: Laboratório de Redes e Gerência LRG) is a laboratory at the Federal University of Santa Catarina, developing research in the areas of computer and telecommunications network… …   Wikipedia

  • D3 Security Management Systems — D3 Security Management Systems, Inc. Type Private Industry Software; Software as a service; Security management; Governance, risk management, and compliance Genre Software development Founded 2002 Founder(s …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Model-driven security — (MDS) means applying model driven approaches (and especially the concepts behind model driven software development) [1] to security. Contents 1 Development of the concept 2 Opinions of industry analysts …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.