This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Reader
Cloud Computing with Security: Concepts and Practices
โ Scribed by Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
- Publisher
- Springer International Publishing
- Year
- 2020
- Tongue
- English
- Leaves
- 381
- Edition
- 2nd ed. 2020
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the โwhyโs and howโsโ of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.
โฆ Table of Contents
Front Matter ....Pages i-xliv
Introduction (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 1-11
Foundations of Cloud Computing and Information Security (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 13-48
Cloud Computing Pyramid (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 49-59
Features of Private and Public Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 61-73
Cloud Workload Characterization (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 75-97
Cloud Management and Monitoring (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 99-110
Cloud Computing and Information Security (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 111-141
Migrating to Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 143-154
Migrating a Complex Industry to Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 155-172
Cost and Billing Practices in Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 173-191
Additional Security Considerations for Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 193-215
Analytics in the Cloud (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 217-233
Future Trends in Cloud Computing (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 235-259
A Quick Test of Your Cloud Fundamentals Grasp (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 261-269
Hands-On Project to Use Cloud Service Provider (Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken)....Pages 271-313
Back Matter ....Pages 315-355
โฆ Subjects
Engineering; Circuits and Systems; Communications Engineering, Networks; Computer Communication Networks
๐ SIMILAR VOLUMES
<p><i>Collaboration with Cloud Computing </i>discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. </p> <p>Drawing upon years of practical experience and us
<p><i>Collaboration with Cloud Computing </i>discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. </p> <p>Drawing upon years of practical experience and us
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examp