close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Home > Computing and Information Technology > Computer networking and communications > Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)
Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)

Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Cloud Computing: Concepts, Technology, Security & Architecture

Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services.

In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included.

All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.



Table of Contents:

Foreword
About the Authors
Acknowledgments
Chapter 1: Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
    Part I: Fundamental Cloud Computing
        Chapter 3: Understanding Cloud Computing
        Chapter 4: Fundamental Concepts and Models
        Chapter 5: Cloud-Enabling Technology
        Chapter 6: Understanding Containerization
        Chapter 7: Understanding Cloud Security and Cybersecurity
    Part II: Cloud Computing Mechanisms
        Chapter 8: Cloud Infrastructure Mechanisms
        Chapter 9: Specialized Cloud Mechanisms
        Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
        Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
        Chapter 12: Cloud Management Mechanisms
    Part III: Cloud Computing Architecture
        Chapter 13: Fundamental Cloud Architectures
        Chapter 14: Advanced Cloud Architectures
        Chapter 15: Specialized Cloud Architectures
    Part IV: Working with Clouds
        Chapter 16: Cloud Delivery Model Considerations
        Chapter 17: Cost Metrics and Pricing Models
        Chapter 18: Service Quality Metrics and SLAs
    Part V: Appendices
        Appendix A: Case Study Conclusions
        Appendix B: Common Containerization Technologies
1.5 Resources
    Pearson Digital Enterprise Book Series
    Thomas Erl on YouTube
        The Digital Enterprise Newsletter on LinkedIn
    Cloud Certified Professional (CCP) Program
Chapter 2: Case Study Background
2.1 Case Study #1: ATN
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
    Technical Infrastructure and Environment
    Business Goals and New Strategy
    Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
    Technical Infrastructure and Environment
    Business Goals and Strategy
    Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
    A Brief History
    Definitions
    Business Drivers
        Cost Reduction
        Business Agility
    Technology Innovations
        Clustering
        Grid Computing
        Capacity Planning
        Virtualization
        Containerization
        Serverless Environments
3.2 Basic Concepts and Terminology
    Cloud
    Container
    IT Resource
    On Premises
    Cloud Consumers and Cloud Providers
    Scaling
        Horizontal Scaling
        Vertical Scaling
    Cloud Service
    Cloud Service Consumer
3.3 Goals and Benefits
    Increased Responsiveness
    Reduced Investments and Proportional Costs
    Increased Scalability
    Increased Availability and Reliability
3.4 Risks and Challenges
    Increased Vulnerability Due to Overlapping Trust Boundaries
    Increased Vulnerability Due to Shared Security Responsibility
    Increased Exposure to Cyber Threats
    Reduced Operational Governance Control
    Limited Portability Between Cloud Providers
    Multiregional Compliance and Legal Issues
    Cost Overruns
Chapter 4: Fundamental Concepts and Models
4.1 Roles and Boundaries
    Cloud Provider
    Cloud Consumer
    Cloud Broker
    Cloud Service Owner
    Cloud Resource Administrator
    Additional Roles
    Organizational Boundary
    Trust Boundary
4.2 Cloud Characteristics
    On-Demand Usage
    Ubiquitous Access
    Multitenancy (and Resource Pooling)
    Elasticity
    Measured Usage
    Resiliency
4.3 Cloud Delivery Models
    Infrastructure as a Service (IaaS)
    Platform as a Service (PaaS)
    Software as a Service (SaaS)
    Comparing Cloud Delivery Models
    Combining Cloud Delivery Models
        IaaS + PaaS
        IaaS + PaaS + SaaS
    Cloud Delivery Submodels
4.4 Cloud Deployment Models
    Public Clouds
    Private Clouds
    Multiclouds
    Hybrid Clouds
Chapter 5: Cloud-Enabling Technology
5.1 Networks and Internet Architecture
    Internet Service Providers (ISPs)
    Connectionless Packet Switching (Datagram Networks)
    Router-Based Interconnectivity
        Physical Network
        Transport Layer Protocol
        Application Layer Protocol
    Technical and Business Considerations
        Connectivity Issues
        Network Bandwidth and Latency Issues
        Wireless and Cellular
        Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
    Virtualization
    Standardization and Modularity
    Autonomic Computing
    Remote Operation and Management
    High Availability
    Security-Aware Design, Operation, and Management
    Facilities
    Computing Hardware
    Storage Hardware
    Network Hardware
        Carrier and External Networks Interconnection
        Web-Tier Load Balancing and Acceleration
        LAN Fabric
        SAN Fabric
        NAS Gateways
    Serverless Environments
    NoSQL Clustering
    Other Considerations
5.3 Modern Virtualization
    Hardware Independence
    Server Consolidation
    Resource Replication
    Operating System–Based Virtualization
    Hardware-Based Virtualization
    Containers and Application-Based Virtualization
    Virtualization Management
    Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
    REST Services
    Web Services
    Service Agents
    Service Middleware
    Web-Based RPC
5.6 Case Study Example
Chapter 6: Understanding Containerization
6.1 Origins and Influences
    A Brief History
    Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
    Operating System Basics
    Virtualization Basics
        Physical Servers
        Virtual Servers
        Hypervisors
        Virtualization Types
    Containerization Basics
        Containers
        Container Images
        Container Engines
        Pods
        Hosts
        Host Clusters
        Host Networks and Overlay Networks
    Virtualization and Containerization
        Containerization on Physical Servers
        Containerization on Virtual Servers
        Containerization Benefits
        Containerization Risks and Challenges
6.3 Understanding Containers
    Container Hosting
    Containers and Pods
    Container Instances and Clusters
    Container Package Management
    Container Orchestration
    Container Package Manager vs. Container Orchestrator
    Container Networks
        Container Network Scope
        Container Network Addresses
    Rich Containers
    Other Common Container Characteristics
6.4 Understanding Container Images
    Container Image Types and Roles
    Container Image Immutability
    Container Image Abstraction
        Operating System Kernel Abstraction
        Operating System Abstraction Beyond the Kernel
    Container Build Files
        Container Image Layers
    How Customized Container Images Are Created
6.5 Multi-Container Types
    Sidecar Container
    Adapter Container
    Ambassador Container
    Using Multi-Containers Together
6.6 Case Study Example
Chapter 7: Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
    Confidentiality
    Integrity
    Availability
    Authenticity
    Security Controls
    Security Mechanisms
    Security Policies
7.2 Basic Threat Terminology
    Risk
    Vulnerability
    Exploit
    Zero-Day Vulnerability
    Security Breach
    Data Breach
    Data Leak
    Threat (or Cyber Threat)
    Attack (or Cyber Attack)
    Attacker and Intruder
    Attack Vector and Surface
7.3 Threat Agents
    Anonymous Attacker
    Malicious Service Agent
    Trusted Attacker
    Malicious Insider
7.4 Common Threats
    Traffic Eavesdropping
    Malicious Intermediary
    Denial of Service
    Insufficient Authorization
    Virtualization Attack
    Overlapping Trust Boundaries
    Containerization Attack
    Malware
    Insider Threat
    Social Engineering and Phishing
    Botnet
    Privilege Escalation
    Brute Force
    Remote Code Execution
    SQL Injection
    Tunneling
    Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
    Flawed Implementations
    Security Policy Disparity
    Contracts
    Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8:
Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
    Case Study Example
8.2 Virtual Server
    Case Study Example
8.3 Hypervisor
    Case Study Example
8.4 Cloud Storage Device
    Cloud Storage Levels
    Network Storage Interfaces
    Object Storage Interfaces
    Database Storage Interfaces
        Relational Data Storage
        Non-Relational Data Storage
    Case Study Example
8.5 Cloud Usage Monitor
    Monitoring Agent
    Resource Agent
    Polling Agent
    Case Study Example
8.6 Resource Replication
    Case Study Example
8.7 Ready-Made Environment
    Case Study Example
8.8 Container
Chapter 9: Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
    Case Study Example
9.2 Load Balancer
    Case Study Example
9.3 SLA Monitor
    Case Study Example
        SLA Monitor Polling Agent
        SLA Monitoring Agent
9.4 Pay-Per-Use Monitor
    Case Study Example
9.5 Audit Monitor
    Case Study Example
9.6 Failover System
    Active–Active
    Active–Passive
    Case Study Example
9.7 Resource Cluster
    Case Study Example
9.8 Multi-Device Broker
    Case Study Example
9.9 State Management Database
    Case Study Example
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.1 Encryption
    Symmetric Encryption
    Asymmetric Encryption
    Case Study Example
10.2 Hashing
    Case Study Example
10.3 Digital Signature
    Case Study Example
10.4 Cloud-Based Security Groups
    Case Study Example
10.5 Public Key Infrastructure (PKI) System
    Case Study Example
10.6 Single Sign-On (SSO) System
    Case Study Example
10.7 Hardened Virtual Server Image
    Case Study Example
10.8 Firewall
    Case Study Example
10.9 Virtual Private Network (VPN)
    Case Study Example
10.10 Biometric Scanner
    Case Study Example
10.11 Multi-Factor Authentication (MFA) System
    Case Study Example
10.12 Identity and Access Management (IAM) System
    Case Study Example
10.13 Intrusion Detection System (IDS)
    Case Study Example
10.14 Penetration Testing Tool
    Case Study Example
10.15 User Behavior Analytics (UBA) System
    Case Study Example
10.16 Third-Party Software Update Utility
    Case Study Example
10.17 Network Intrusion Monitor
    Case Study Example
10.18 Authentication Log Monitor
    Case Study Example
10.19 VPN Monitor
    Case Study Example
10.20 Additional Cloud Security Access-Oriented Practices and Technologies
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
11.1 Digital Virus Scanning and Decryption System
    Generic Decryption
    Digital Immune System
    Case Study Example
11.2 Malicious Code Analysis System
    Case Study Example
11.3 Data Loss Prevention (DLP) System
    Case Study Example
11.4 Trusted Platform Module (TPM)
    Case Study Example
11.5 Data Backup and Recovery System
    Case Study Example
11.6 Activity Log Monitor
    Case Study Example
11.7 Traffic Monitor
    Case Study Example
11.8 Data Loss Protection Monitor
    Case Study Example
Chapter 12: Cloud Management Mechanisms
12.1 Remote Administration System
    Case Study Example
12.2 Resource Management System
    Case Study Example
12.3 SLA Management System
    Case Study Example
12.4 Billing Management System
    Case Study Example
PART III: CLOUD COMPUTING ARCHITECTURE
Chapter 13:
Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multicloud Architecture
13.10 Case Study Example
Chapter 14: Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load-Balanced Virtual Server Instances Architecture
14.4 Nondisruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15: Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering Architecture
15.7 Load-Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration Architecture
15.10 Redundant Physical Connection for Virtual Servers Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
15.14 Virtual Data Abstraction Architecture
15.15 Metacloud Architecture
15.16 Federated Cloud Application Architecture
PART IV: WORKING WITH CLOUDS
Chapter 16:
Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider Perspective
    Building IaaS Environments
        Data Centers
        Scalability and Reliability
        Monitoring
        Security
    Equipping PaaS Environments
        Scalability and Reliability
        Monitoring
        Security
    Optimizing SaaS Environments
        Security
16.2 Cloud Delivery Models: The Cloud Consumer Perspective
    Working with IaaS Environments
        IT Resource Provisioning Considerations
    Working with PaaS Environments
        IT Resource Provisioning Considerations
    Working with SaaS Services
16.3 Case Study Example
Chapter 17: Cost Metrics and Pricing Models
17.1 Business Cost Metrics
    Up-Front and Ongoing Costs
    Additional Costs
Case Study Example
    Product Catalog Browser
        On-Premises Up-Front Costs
        On-Premises Ongoing Costs
        Cloud-Based Up-Front Costs
        Cloud-Based Ongoing Costs
17.2 Cloud Usage Cost Metrics
    Network Usage
        Inbound Network Usage Metric
        Outbound Network Usage Metric
        Intra-Cloud WAN Usage Metric
    Server Usage
        On-Demand Virtual Machine Instance Allocation Metric
        Reserved Virtual Machine Instance Allocation Metric
    Cloud Storage Device Usage
        On-Demand Storage Space Allocation Metric
        I/O Data Transferred Metric
    Cloud Service Usage
        Application Subscription Duration Metric
        Number of Nominated Users Metric
        Number of Transactions Users Metric
17.3 Cost Management Considerations
    Pricing Models
    Multicloud Cost Management
    Additional Considerations
Case Study Example
    Virtual Server On-Demand Instance Allocation
    Virtual Server Reserved Instance Allocation
    Cloud Storage Device
    WAN Traffic
Chapter 18: Service Quality Metrics and SLAs
18.1 Service Quality Metrics
    Service Availability Metrics
        Availability Rate Metric
        Outage Duration Metric
    Service Reliability Metrics
        Mean Time Between Failures (MTBF) Metric
        Reliability Rate Metric
    Service Performance Metrics
        Network Capacity Metric
        Storage Device Capacity Metric
        Server Capacity Metric
        Web Application Capacity Metric
        Instance Starting Time Metric
        Response Time Metric
        Completion Time Metric
    Service Scalability Metrics
        Storage Scalability (Horizontal) Metric
        Server Scalability (Horizontal) Metric
        Server Scalability (Vertical) Metric
    Service Resiliency Metrics
        Mean Time to Switchover (MTSO) Metric
        Mean Time to System Recovery (MTSR) Metric
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
        Scope and Applicability
        Service Quality Guarantees
        Definitions
        Usage of Financial Credits
        SLA Exclusions
PART V: APPENDICES
Appendix A:
Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B: Common Containerization Technologies
B.1 Docker
    Docker Server
    Docker Client
    Docker Registry
    Docker Objects
    Docker Swarm (Container Orchestrator)
B.2 Kubernetes
    Kubernetes Node (Host)
    Kubernetes Pod
    Kubelet
    Kube-Proxy
    Container Runtime (Container Engine)
    Cluster
    Kubernetes Control Plane


9780138052256    TOC    7/17/2023


Best Seller

| | See All


Product Details
  • ISBN-13: 9780138052140
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Language: English
  • Series Title: The Pearson Digital Enterprise Series from Thomas Erl
  • ISBN-10: 013805214X
  • Publisher Date: 14 Aug 2023
  • Binding: Digital download
  • No of Pages: 608
  • Sub Title: Concepts, Technology, Security, and Architecture


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)
Pearson Education (US) -
Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cloud Computing: Concepts, Technology, Security, and Architecture(The Pearson Digital Enterprise Series from Thomas Erl)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA