Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edition Thomas Erl - The ebook is available for instant download, read anywhere
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edition Thomas Erl - The ebook is available for instant download, read anywhere
https://ebookmass.com/product/cloud-computing-concepts-technology-
security-architecture-thomas-erl-eric-barcelo-monroy/
https://ebookmass.com/product/aws-cloud-computing-concepts-and-tech-
analogies-ashish-prajapati/
https://ebookmass.com/product/comptia-cloud-guide-to-cloud-computing-
west/
Cloud-native Computing Pethuru Raj
https://ebookmass.com/product/cloud-native-computing-pethuru-raj/
https://ebookmass.com/product/cloud-computing-law-2nd-edition-
christopher-millard/
https://ebookmass.com/product/cloud-computing-theory-and-practice-3rd-
edition-dan-c-marinescu/
https://ebookmass.com/product/cloud-computing-law-2nd-edition-
christopher-millard-editor/
https://ebookmass.com/product/the-cloud-to-thing-continuum-
opportunities-and-challenges-in-cloud-fog-and-edge-computing-1st-ed-
edition-theo-lynn/
Cloud Computing
Concepts, Technology, Security, and Architecture
Second Edition
Thomas Erl
Eric Barcelo
Pearson
Contents at a Glance
Chapter 1 Introduction
Chapter 2 Case Study Background
Chapter 3 Understanding Cloud Computing
Part I Fundamental Cloud Computing
Chapter 4 Fundamental Concepts and Models
Chapter 5 Cloud-Enabling Technology
Chapter 6 Understanding Containerization
Chapter 7 Understanding Cloud Security and Cybersecurity
Part II Cloud Computing Mechanisms
Chapter 8 Cloud Infrastructure Mechanisms
Chapter 9 Specialized Cloud Mechanisms
Chapter 10 Cloud and Cybersecurity Access-Oriented
Mechanisms
Chapter 11 Cloud and Cyber Security Data-Oriented
Mechanisms
Chapter 12 Cloud Management Mechanisms
Part III Cloud Computing Architecture
Chapter 13 Fundamental Cloud Architectures
Chapter 14 Advanced Cloud Architectures
Chapter 15 Specialized Cloud Architectures
Part IV Working with Clouds
Chapter 16 Cloud Delivery Model Considerations
Chapter 17 Cost Metrics and Pricing Models
Chapter 18 Service Quality Metrics and SLAs
Part V Appendices
Appendix A Case Study Conclusions
Appendix B Common Containerization Technologies
Table of Contents
Chapter 1 Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
1.5 Resources
Chapter 2 Case Study Background
2.1 Case Study #1: ATN
2.2 Case Study #2: DTGOV
2.3 Case Study #3: Innovartus Technologies Inc.
Chapter 3 Understanding Cloud Computing
3.1 Origins and Influences
3.2 Basic Concepts and Terminology
3.3 Goals and Benefits
3.4 Risks and Challenges
Part I Fundamental Cloud Computing
Chapter 4 Fundamental Concepts and Models
4.1 Roles and Boundaries
4.2 Cloud Characteristics
4.3 Cloud Delivery Models
4.4 Cloud Deployment Models
Chapter 5 Cloud-Enabling Technology
5.1 Networks and Internet Architecture
5.2 Cloud Data Center Technology
5.3 Modern Virtualization
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
5.6 Case Study Example
Chapter 6 Understanding Containerization
6.1 Origins and Influences
6.2 Fundamental Virtualization and Containerization
6.3 Understanding Containers
6.4 Understanding Container Images
6.5 Multi-Container Types
6.6 Case Study Example
Chapter 7 Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
7.2 Basic Threat Terminology
7.3 Threat Agents
7.4 Common Threats
7.5 Case Study Example
7.6 Additional Considerations
7.7 Case Study Example
Part II Cloud Computing Mechanisms
Chapter 8 Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
8.2 Virtual Server
8.3 Hypervisor
8.4 Cloud Storage Device
8.5 Cloud Usage Monitor
8.6 Resource Replication
8.7 Ready-Made Environment
8.8 Container
Chapter 9 Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
9.2 Load Balancer
9.3 SLA Monitor
9.4 Pay-Per-Use Monitor
9.5 Audit Monitor
9.6 Failover System
9.7 Resource Cluster
9.8 Multi-Device Broker
9.9 State Management Database
Chapter 10 Cloud and Cybersecurity Access-Oriented
Mechanisms
10.1 Encryption
10.2 Hashing
10.3 Digital Signature
10.4 Cloud-Based Security Groups
10.5 Public Key Infrastructure (PKI) System
10.6 Single Sign-On (SSO) System
10.7 Hardened Virtual Server Image
10.8 Firewall
10.9 Virtual Private Network (VPN)
10.10 Biometric Scanner
10.11 Multi-Factor Authentication (MFA) System
10.12 Identity and Access Management (IAM) System
10.13 Intrusion Detection System (IDS)
10.14 Penetration Testing Tool
10.15 User Behavior Analytics (UBA) System
10.16 Third-Party Software Update Utility
10.17 Network Intrusion Monitor
10.18 Authentication Log Monitor
10.19 VPN Monitor
10.20 Additional Cloud Security Access-Oriented Practices
and Technologies
Chapter 11 Cloud and Cyber Security Data-Oriented
Mechanisms
11.1 Digital Virus Scanning and Decryption System
11.2 Digital Immune System
11.3 Malicious Code Analysis System
11.4 Data Loss Prevention (DLP) System
11.5 Trusted Platform Module (TPM)
11.6 Data Backup and Recovery System
11.7 Activity Log Monitor
11.8 Traffic Monitor
11.9 Data Loss Protection Monitor
Chapter 12 Cloud Management Mechanisms
12.1 Remote Administration System
12.2 Resource Management System
12.3 SLA Management System
12.4 Billing Management System
Part III Cloud Computing Architecture
Chapter 13 Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multi-Cloud Architecture
13.10 Case Study Example
Chapter 14 Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load Balanced Virtual Server Instances Architecture
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
14.4 Non-Disruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery
Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15 Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering
Architecture
15.7 Load Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration
Architecture
15.10 Redundant Physical Connection for Virtual Servers
Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
Part IV Working with Clouds
Chapter 16 Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider
Perspective
16.2 Cloud Delivery Models: The Cloud Consumer
Perspective
16.3 Case Study Example
Chapter 17 Cost Metrics and Pricing Models
17.1 Business Cost Metrics
17.2 Cloud Usage Cost Metrics
17.3 Cost Management Considerations
Chapter 18 Service Quality Metrics and SLAs
18.1 Service Quality Metrics
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
Part V Appendices
Appendix A Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B Common Containerization Technologies
B.1 Docker
B.2 Kubernetes
Chapter 1
Introduction
1.5 Resources
Cloud computing has much to offer but its roadmap is riddled with
pitfalls, ambiguities, and mistruths. The best way to navigate this
landscape is to chart each part of the journey by making educated
decisions about how and to what extent your project should
proceed. The scope of an adoption is equally important to its
approach, and both of these aspects need to be determined by
business requirements. Not by a product vendor, not by a cloud
vendor, and not by self-proclaimed cloud experts. Your organization’s
business goals must be fulfilled in a concrete and measurable
manner with each completed phase of the adoption. This validates
your scope, your approach, and the overall direction of the project.
In other words, it keeps your project aligned.
—Thomas Erl
• Part V: Appendices
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com