Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This eBook Title Page Copyright Page Praise for this Book Dedication Page Contents at a Glance Contents Foreword by Pamela J. Wise-Martinez Acknowledgments Chapter 1. Introduction
1.1. Objectives of This Book 1.2. What This Book Does Not Cover 1.3. Who This Book Is For 1.4. How This Book Is Organized 1.5. Conventions 1.6. Additional Information
Chapter 2. Case Study Background
2.1. Case Study #1: ATN 2.2. Case Study #2: DTGOV 2.3. Case Study #3: Innovartus Technologies Inc.
Part I: Fundamental Cloud Computing
Chapter 3. Understanding Cloud Computing
3.1. Origins and Influences 3.2. Basic Concepts and Terminology 3.3. Goals and Benefits 3.4. Risks and Challenges
Chapter 4. Fundamental Concepts and Models
4.1. Roles and Boundaries 4.2. Cloud Characteristics 4.3. Cloud Delivery Models 4.4. Cloud Deployment Models
Chapter 5. Cloud-Enabling Technology
5.1. Broadband Networks and Internet Architecture 5.2. Data Center Technology 5.3. Virtualization Technology 5.4. Web Technology 5.5. Multitenant Technology 5.6. Service Technology
Chapter 6. Fundamental Cloud Security
6.1. Basic Terms and Concepts 6.2. Threat Agents 6.3. Cloud Security Threats 6.4. Additional Considerations
Part II: Cloud Computing Mechanisms
Chapter 7. Cloud Infrastructure Mechanisms
7.1. Logical Network Perimeter 7.2. Virtual Server 7.3. Cloud Storage Device 7.4. Cloud Usage Monitor 7.5. Resource Replication 7.6. Ready-Made Environment
Chapter 8. Specialized Cloud Mechanisms
8.1. Automated Scaling Listener 8.2. Load Balancer 8.3. SLA Monitor 8.4. Pay-Per-Use Monitor 8.5. Audit Monitor 8.6. Failover System 8.7. Hypervisor 8.8. Resource Cluster 8.9. Multi-Device Broker 8.10. State Management Database
Chapter 9. Cloud Management Mechanisms
9.1. Remote Administration System 9.2. Resource Management System 9.3. SLA Management System 9.4. Billing Management System
Chapter 10. Cloud Security Mechanisms
10.1. Encryption 10.2. Hashing 10.3. Digital Signature 10.4. Public Key Infrastructure (PKI) 10.5. Identity and Access Management (IAM) 10.6. Single Sign-On (SSO) 10.7. Cloud-Based Security Groups 10.8. Hardened Virtual Server Images
Part III: Cloud Computing Architecture
Chapter 11. Fundamental Cloud Architectures
11.1. Workload Distribution Architecture 11.2. Resource Pooling Architecture 11.3. Dynamic Scalability Architecture 11.4. Elastic Resource Capacity Architecture 11.5. Service Load Balancing Architecture 11.6. Cloud Bursting Architecture 11.7. Elastic Disk Provisioning Architecture 11.8. Redundant Storage Architecture
Chapter 12. Advanced Cloud Architectures
12.1. Hypervisor Clustering Architecture 12.2. Load Balanced Virtual Server Instances Architecture 12.3. Non-Disruptive Service Relocation Architecture 12.4. Zero Downtime Architecture 12.5. Cloud Balancing Architecture 12.6. Resource Reservation Architecture 12.7. Dynamic Failure Detection and Recovery Architecture 12.8. Bare-Metal Provisioning Architecture 12.9. Rapid Provisioning Architecture 12.10. Storage Workload Management Architecture
Chapter 13. Specialized Cloud Architectures
13.1. Direct I/O Access Architecture 13.2. Direct LUN Access Architecture 13.3. Dynamic Data Normalization Architecture 13.4. Elastic Network Capacity Architecture 13.5. Cross-Storage Device Vertical Tiering Architecture 13.6. Intra-Storage Device Vertical Data Tiering Architecture 13.7. Load Balanced Virtual Switches Architecture 13.8. Multipath Resource Access Architecture 13.9. Persistent Virtual Network Configuration Architecture 13.10. Redundant Physical Connection for Virtual Servers Architecture 13.11. Storage Maintenance Window Architecture
Part IV: Working with Clouds
Chapter 14. Cloud Delivery Model Considerations
14.1. Cloud Delivery Models: The Cloud Provider Perspective 14.2. Cloud Delivery Models: The Cloud Consumer Perspective
Chapter 15. Cost Metrics and Pricing Models
15.1. Business Cost Metrics 15.2. Cloud Usage Cost Metrics 15.3. Cost Management Considerations
Chapter 16. Service Quality Metrics and SLAs
16.1. Service Quality Metrics 16.3. SLA Guidelines
Part V: Appendices
Appendix A. Case Study Conclusions
A.1. ATN A.2. DTGOV A.3. Innovartus
Appendix B. Industry Standards Organizations
B.1. National Institute of Standards and Technology (NIST) B.2. Cloud Security Alliance (CSA) B.3. Distributed Management Task Force (DMTF) B.4. Storage Networking Industry Association (SNIA) B.5. Organization for the Advancement of Structured Information Standards (OASIS) B.6. The Open Group B.7. Open Cloud Consortium (OCC) B.8. European Telecommunications Standards Institute (ETSI) B.9. Telecommunications Industry Association (TIA) B.10. Liberty Alliance B.11. Open Grid Forum (OGF)
Appendix C. Mapping Mechanisms to Characteristics Appendix D. Data Center Facilities (TIA-942)
D.1. Primary Rooms D.2. Environmental Controls D.3. Infrastructure Redundancy Summary
Appendix E. Cloud-Adapted Risk Management Framework
E.1. Security Conservation Principle E.2. The Risk Management Framework
Appendix F. Cloud Provisioning Contracts
F.1. Cloud Provisioning Contract Structure F.2. Cloud Provider Selection Guidelines
Appendix G. Cloud Business Case Template
G.1. Business Case Identification G.2. Business Needs G.3. Target Cloud Environment G.4. Technical Issues G.5. Economic Factors
About the Authors
Thomas Erl Zaigham Mahmood Ricardo Puttini
About the Contributors
Pamela J. Wise-Martinez, MSc Gustavo Azzolin, BSc, MSc Dr. Michaela Iorga, Ph.D. Amin Naserpour Vinícius Pacheco, MSc Matthias Ziegler
Index Inside Front Cover Inside Back Cover
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion