Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This eBook Title Page Copyright Page Praise for This Book Dedication Page Contents at a Glance Contents Acknowledgments Chapter 1. Introduction
Objective of This Book What This Book Does Not Cover Who This Book Is For Origin of This Book Recommended Reading How This Book Is Organized
Chapter 3: Sharing, Scaling and Elasticity Patterns Chapter 4: Reliability, Resiliency and Recovery Patterns Chapter 5: Data Management and Storage Device Patterns Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns Chapter 7: Monitoring, Provisioning and Administration Patterns Chapter 8: Cloud Service and Storage Security Patterns Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns Chapter 10: Common Compound Patterns Appendix A: Cloud Computing Mechanisms Glossary Appendix B: Alphabetical Design Patterns Reference
Additional Information
Symbol Legend Pattern Documentation Conventions Updates, Errata, and Resources (www.servicetechbooks.com) Cloud Computing Design Patterns (www.cloudpatterns.org) What Is Cloud? (www.whatiscloud.com) Referenced Specifications (www.servicetechspecs.com) The Service Technology Magazine (www.servicetechmag.com) CloudSchool.com™ Certified Cloud (CCP) Professional (www.cloudschool.com) Social Media and Notification
Chapter 2. Understanding Design Patterns
About Pattern Profiles
Requirement Icon Problem Solution Application Mechanisms
About Compound Patterns Design Pattern Notation
Capitalization Page Number References
Measures of Design Pattern Application Working with This Catalog
Chapter 3. Sharing, Scaling and Elasticity Patterns
Shared Resources
Problem Solution Application Mechanisms
Workload Distribution
Problem Solution Application Mechanisms
Dynamic Scalability
Problem Solution Application Mechanisms
Service Load Balancing
Problem Solution Application Mechanisms
Elastic Resource Capacity
Problem Solution Application Mechanisms
Elastic Network Capacity
Problem Solution Application Mechanisms
Elastic Disk Provisioning
Problem Solution Application Mechanisms
Load Balanced Virtual Server Instances
Problem Solution Application Mechanisms
Load Balanced Virtual Switches
Problem Solution Application Mechanisms
Service State Management
Problem Solution Application Mechanisms
Storage Workload Management
Problem Solution Application Mechanisms
Dynamic Data Normalization
Problem Solution Application Mechanisms
Cross-Storage Device Vertical Tiering
Problem Solution Application Mechanisms
Intra-Storage Device Vertical Data Tiering
Problem Solution Application Mechanisms
Memory Over-Committing
Problem Solution Application Mechanisms
NIC Teaming
Problem Solution Application Mechanisms
Broad Access
Problem Solution Application Mechanisms
Chapter 4. Reliability, Resiliency and Recovery Patterns
Resource Pooling
Problem Solution Application Mechanisms
Resource Reservation
Problem Solution Application Mechanisms
Hypervisor Clustering
Problem Solution Application Mechanisms
Redundant Storage
Problem Solution Application Mechanisms
Dynamic Failure Detection and Recovery
Problem Solution Application Mechanisms
Multipath Resource Access
Problem Solution Application Mechanisms
Redundant Physical Connection for Virtual Servers
Problem Solution Application Mechanisms
Synchronized Operating State
Problem Solution Application Mechanisms
Zero Downtime
Problem Solution Application Mechanisms
Storage Maintenance Window
Problem Solution Application Mechanisms
Virtual Server Auto Crash Recovery
Problem Solution Application Mechanisms
Non-Disruptive Service Relocation
Problem Solution Application Mechanisms
Chapter 5. Data Management and Storage Device Patterns
Direct I/O Access
Problem Solution Application Mechanisms
Direct LUN Access
Problem Solution Application Mechanisms
Single Root I/O Virtualization
Problem Solution Application Mechanisms
Cloud Storage Data at Rest Encryption
Problem Solution Application Mechanisms
Cloud Storage Data Lifecycle Management
Problem Solution Application Mechanisms
Cloud Storage Data Management
Problem Solution Application Mechanisms
Cloud Storage Data Placement Compliance Check
Problem Solution Application Mechanisms
Cloud Storage Device Masking
Problem Solution Application Mechanisms
Cloud Storage Device Path Masking
Problem Solution Application Mechanisms
Cloud Storage Device Performance Enforcement
Problem Solution Application Mechanisms
Virtual Disk Splitting
Problem Solution Application Mechanisms
Sub-LUN Tiering
Problem Solution Application Mechanisms
RAID-Based Data Placement
Problem Solution Application Mechanisms
IP Storage Isolation
Problem Solution Application Mechanisms
Chapter 6. Virtual Server and Hypervisor Connectivity and Management Patterns
Virtual Server Folder Migration
Problem Solution Application Mechanisms
Persistent Virtual Network Configuration
Problem Solution Application Mechanisms
Virtual Server Connectivity Isolation
Problem Solution Application Mechanisms
Virtual Switch Isolation
Problem Solution Application Mechanisms
Virtual Server NAT Connectivity
Problem Solution Application Mechanisms
External Virtual Server Accessibility
Problem Solution Application Mechanisms
Cross-Hypervisor Workload Mobility
Problem Solution Application Mechanisms
Virtual Server-to-Host Affinity
Problem Solution Application Mechanisms
Virtual Server-to-Host Anti-Affinity
Problem Solution Application Mechanisms
Virtual Server-to-Host Connectivity
Problem Solution Application Mechanisms
Virtual Server-to-Virtual Server Affinity
Problem Solution Application Mechanisms
Virtual Server-to-Virtual Server Anti-Affinity
Problem Solution Application Mechanisms
Stateless Hypervisor
Problem Solution Application Mechanisms
Chapter 7. Monitoring, Provisioning and Administration Patterns
Usage Monitoring
Problem Solution Application Mechanisms
Pay-as-You-Go
Problem Solution Application Mechanisms
Realtime Resource Availability
Problem Solution Application Mechanisms
Rapid Provisioning
Problem Solution Application Mechanisms
Platform Provisioning
Problem Solution Application Mechanisms
Bare-Metal Provisioning
Problem Solution Application Mechanisms
Automated Administration
Problem Solution Application Mechanisms
Centralized Remote Administration
Problem Solution Application Mechanisms
Resource Management
Problem Solution Application Mechanisms
Self-Provisioning
Problem Solution Application Mechanisms
Power Consumption Reduction
Problem Solution Application Mechanisms
Chapter 8. Cloud Service and Storage Security Patterns
Trusted Platform BIOS
Problem Solution Application Mechanisms
Geotagging
Problem Solution Application Mechanisms
Hypervisor Protection
Problem Solution Application Mechanisms
Cloud VM Platform Encryption
Problem Solution Application Mechanisms
Trusted Cloud Resource Pools
Problem Solution Application Mechanisms
Secure Cloud Interfaces and APIs
Problem Solution Application Mechanisms
Cloud Resource Access Control
Problem Solution Application Mechanisms
Detecting and Mitigating User-Installed VMs
Problem Solution Application Mechanisms
Mobile BYOD Security
Problem Solution Application Mechanisms
Cloud Data Breach Protection
Problem Solution Application Mechanisms
Permanent Data Loss Protection
Problem Solution Application Mechanisms
In-Transit Cloud Data Encryption
Problem Solution Application Mechanisms
Chapter 9. Network Security, Identity & Access Management and Trust Assurance Patterns
Secure On-Premise Internet Access
Problem Solution Application Mechanisms
Secure External Cloud Connection
Problem Solution Application Mechanisms
Secure Connection for Scaled VMs
Problem Solution Application Mechanisms
Cloud Denial-of-Service Protection
Problem Solution Application Mechanisms
Cloud Traffic Hijacking Protection
Problem Solution Application Mechanisms
Automatically Defined Perimeter
Problem Solution Application Mechanisms
Cloud Authentication Gateway
Problem Solution Application Mechanisms
Federated Cloud Authentication
Problem Solution Application Mechanisms
Cloud Key Management
Problem Solution Application Mechanisms
Trust Attestation Service
Problem Solution Application Mechanisms
Collaborative Monitoring and Logging
Problem Solution Application Mechanisms
Independent Cloud Auditing
Problem Solution Application Mechanisms
Threat Intelligence Processing
Problem Solution Application Mechanisms
Chapter 10. Common Compound Patterns
“Compound Pattern” vs. “Composite Pattern” Compound Pattern Members Joint Application vs. Coexistent Application Private Cloud Public Cloud Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS) Elastic Environment Multitenant Environment Resilient Environment Cloud Bursting Burst Out to Private Cloud Burst Out to Public Cloud Burst In Secure Burst Out to Private Cloud/Public Cloud Cloud Balancing Cloud Authentication Resource Workload Management Isolated Trust Boundary
Appendix A. Cloud Computing Mechanisms Glossary
Application Delivery Controller (ADC) Attestation Service Attribute Authority Attribute-Based Access Control (ABAC) System Audit Monitor Authentication Gateway Service (AGS) Automated Scaling Listener Automatically Defined Perimeter (ADP) Controller Billing Management System Certificate Certificate Authority (CA) Certificate Revocation List (CRL) Certificate Trust Store Certificate Validation Service (CVS) Cloud Consumer Gateway (CCG) Cloud Storage Data Placement Auditor Cloud Storage Device Cloud Storage Device Performance Monitor Cloud Storage Management Portal Cloud Usage Monitor Cloud Workload Scheduler Cloud-based Security Groups Cryptographic Key Management System (CKMS) Digital Signature Domain Name Service (DNS) Encryption Endpoint Threat Detection and Response (ETDR) Enterprise Mobility Management (EMM) System Failover System Geotag Hardened Virtual Server Image Hardware-Based VM Discovery System Hardware Security Module (HSM) Honeypot Host-Based Security System (HBSS) Hypervisor Identity and Access Management (IAM) Intrusion Detection and Prevention System (IDPS) Live VM Migration Load Balancer Logical Network Perimeter LUN Masking Malware Hash Multi-Device Broker Network Forensics Monitor Orchestration Engine Pay-Per-Use Monitor Physical Uplink Platform Trust Policy Public Key Infrastructure (PKI) RAID-level Idenfitier Ready-Made Environment Remote Administration System Resource Cluster Resource Management System Resource Replication Sandbox Secure Token Service (STS) Security Information and Event Management (SIEM) System Single Sign-On (SSO) SLA Management System SLA Monitor State Management Database Storage Path Masking Sub-LUN Migration Threat Intelligence System Traffic Filter Traffic Monitor Trusted Platform Module (TPM) Virtual Appliance Virtual CPU (vCPU) Virtual Disk (vDisk) Virtual Firewall Virtual Infrastructure Manager (VIM) Virtual Network Virtual Private Cloud (VPC) Virtual Private Network (VPN) Virtual RAM (vRAM) Virtual Server Virtual Server Snapshot Virtual Server State Manager Virtual Switch Virtualization Agent Virtualization Monitor VPN Cloud Hub
Appendix B. Alphabetical Design Patterns Reference About the Authors
Thomas Erl Robert Cope Amin Naserpour
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion