Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Presentation

Cloud computing_Concept, technology, security and architecture, 2nd edition

Rating
-
Sold
-
Pages
578
Uploaded on
30-07-2024
Written in
2015/2016

"Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the worlds top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side"

Show more Read less
Institution
Course

Content preview

,Contents
1. Foreword
2. About the Authors
3. Acknowledgments
4. Chapter 1: Introduction
1. 1.1 Objectives of This Book
2. 1.2 What This Book Does Not Cover
3. 1.3 Who This Book Is For
4. 1.4 How This Book Is Organized
1. Part I: Fundamental Cloud Computing
1. Chapter 3: Understanding Cloud Computing
2. Chapter 4: Fundamental Concepts and Models
3. Chapter 5: Cloud-Enabling Technology
4. Chapter 6: Understanding Containerization
5. Chapter 7: Understanding Cloud Security and
Cybersecurity
2. Part II: Cloud Computing Mechanisms
1. Chapter 8: Cloud Infrastructure Mechanisms
2. Chapter 9: Specialized Cloud Mechanisms
3. Chapter 10: Cloud Security and Cybersecurity Access-
Oriented Mechanisms
4. Chapter 11: Cloud Security and Cybersecurity Data-
Oriented Mechanisms
5. Chapter 12: Cloud Management Mechanisms
3. Part III: Cloud Computing Architecture
1. Chapter 13: Fundamental Cloud Architectures
2. Chapter 14: Advanced Cloud Architectures
3. Chapter 15: Specialized Cloud Architectures
4. Part IV: Working with Clouds
1. Chapter 16: Cloud Delivery Model Considerations
2. Chapter 17: Cost Metrics and Pricing Models
3. Chapter 18: Service Quality Metrics and SLAs
5. Part V: Appendices
1. Appendix A: Case Study Conclusions
2. Appendix B: Common Containerization Technologies
5. 1.5 Resources
1. Pearson Digital Enterprise Book Series
2. Thomas Erl on YouTube
3. The Digital Enterprise Newsletter on LinkedIn
4. Cloud Certified Professional (CCP) Program
5. Chapter 2: Case Study Background
1. 2.1 Case Study #1: ATN
1. Technical Infrastructure and Environment
2. Business Goals and New Strategy
3. Roadmap and Implementation Strategy

, 2. 2.2 Case Study #2: DTGOV
1. Technical Infrastructure and Environment
2. Business Goals and New Strategy
3. Roadmap and Implementation Strategy
3. 2.3 Case Study #3: Innovartus Technologies Inc.
1. Technical Infrastructure and Environment
2. Business Goals and Strategy
3. Roadmap and Implementation Strategy
6. PART I: FUNDAMENTAL CLOUD COMPUTING
1. Chapter 3: Understanding Cloud Computing
1. 3.1 Origins and Influences
1. A Brief History
2. Definitions
3. Business Drivers
1. Cost Reduction
2. Business Agility
4. Technology Innovations
1. Clustering
2. Grid Computing
3. Capacity Planning
4. Virtualization
5. Containerization
6. Serverless Environments
2. 3.2 Basic Concepts and Terminology
1. Cloud
2. Container
3. IT Resource
4. On Premises
5. Cloud Consumers and Cloud Providers
6. Scaling
1. Horizontal Scaling
2. Vertical Scaling
7. Cloud Service
8. Cloud Service Consumer
3. 3.3 Goals and Benefits
1. Increased Responsiveness
2. Reduced Investments and Proportional Costs
3. Increased Scalability
4. Increased Availability and Reliability
4. 3.4 Risks and Challenges
1. Increased Vulnerability Due to Overlapping Trust
Boundaries
2. Increased Vulnerability Due to Shared Security
Responsibility
3. Increased Exposure to Cyber Threats
4. Reduced Operational Governance Control

, 5. Limited Portability Between Cloud Providers
6. Multiregional Compliance and Legal Issues
7. Cost Overruns
2. Chapter 4: Fundamental Concepts and Models
1. 4.1 Roles and Boundaries
1. Cloud Provider
2. Cloud Consumer
3. Cloud Broker
4. Cloud Service Owner
5. Cloud Resource Administrator
6. Additional Roles
7. Organizational Boundary
8. Trust Boundary
2. 4.2 Cloud Characteristics
1. On-Demand Usage
2. Ubiquitous Access
3. Multitenancy (and Resource Pooling)
4. Elasticity
5. Measured Usage
6. Resiliency
3. 4.3 Cloud Delivery Models
1. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)
4. Comparing Cloud Delivery Models
5. Combining Cloud Delivery Models
1. IaaS + PaaS
2. IaaS + PaaS + SaaS
6. Cloud Delivery Submodels
4. 4.4 Cloud Deployment Models
1. Public Clouds
2. Private Clouds
3. Multiclouds
4. Hybrid Clouds
3. Chapter 5: Cloud-Enabling Technology
1. 5.1 Networks and Internet Architecture
1. Internet Service Providers (ISPs)
2. Connectionless Packet Switching (Datagram Networks)
3. Router-Based Interconnectivity
1. Physical Network
2. Transport Layer Protocol
3. Application Layer Protocol
4. Technical and Business Considerations
1. Connectivity Issues
2. Network Bandwidth and Latency Issues
3. Wireless and Cellular

Written for

Course

Document information

Uploaded on
July 30, 2024
Number of pages
578
Written in
2015/2016
Type
PRESENTATION
Person
Unknown

Subjects

$4.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
RobertCuong

Get to know the seller

Seller avatar
RobertCuong Telecommunication
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
225
Last sold
-
GPON and WiFi

+ SDH solution based on Fujitsu/Alcatel/Huawei devices in deployment and troubleshoot + Switching and Routing network fundamental and advance + GPON solution with deep knowledge of PLOAM/OMCI, activation procedure. Analysis of Private/Public OMCI + WiFi solution with WiFi Management/Control/Data. WiFi bandsteering, WiFi mesh, and WiFi 6, 6E, 7, ...

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions