Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cloud Application Architectures
Preface
Audience for This Book Organization of the Material Conventions Used in This Book Using Code Examples Safari® Books Online We’d Like Your Feedback! Acknowledgments
1. Cloud Computing
The Cloud
Software Hardware
The advantages of a cloud infrastructure Hardware virtualization Cloud storage
Cloud Application Architectures
Grid Computing Transactional Computing
The Value of Cloud Computing
Options for an IT Infrastructure The Economics
Capital costs Cost comparison The bottom line
Cloud Infrastructure Models
Platform As a Service Vendor Infrastructure As a Service Private Clouds All of the Above
An Overview of Amazon Web Services
Amazon Elastic Cloud Compute (EC2) Amazon Simple Storage Service (S3) Amazon Simple Queue Service (SQS) Amazon CloudFront Amazon SimpleDB
2. Amazon Cloud Computing
Amazon S3
Access to S3
Web Services BitTorrent
S3 in Action
Amazon EC2
EC2 Concepts EC2 Access Instance Setup Access to an Instance Security Groups Availability Zones Static IP Addresses Data Storage in EC2
EBS volume setup Volume management Snapshots
AMI Management
3. Before the Move into the Cloud
Know Your Software Licenses The Shift to a Cloud Cost Model
How to Approach Cost Comparisons A Sample Cloud ROI Analysis Where the Cloud Saves Money
Service Levels for Cloud Applications
Availability
How to estimate the availability of your system What constitutes availability? Cloud service availability Amazon Web Services service levels Expected availability in the cloud Reliability
Performance
Clustering versus independent nodes EC2 performance constraints
Security
Legal, Regulatory, and Standards Implications There Is No Perimeter in the Cloud The Risk Profile for S3 and Other Cloud Storage Solutions Is Unproven
Disaster Recovery
4. Ready for the Cloud
Web Application Design
System State and Protecting Transactions
The problem with memory locks Transactional integrity through stored procedures Two alternatives to stored procedures
When Servers Fail
Machine Image Design
Amazon Machine Image Data Security What Belongs in a Machine Image? A Sample MySQL Machine Image Amazon AMI Philosophies
Privacy Design
Privacy in the Cloud
Managing the credit card encryption Processing a credit card transaction If the e-commerce application is compromised If the credit card processor is compromised
When the Amazon Cloud Fails to Meet Your Needs
Database Management
Clustering or Replication?
Using database clustering in the cloud Using database replication in the cloud Replication for performance
Primary Key Management
How to generate globally unique primary keys Support for globally unique random keys
Database Backups
Types of database backups Applying a backup strategy for the cloud
5. Security
Data Security
Data Control
When the cloud provider goes down When a subpoena compels your cloud provider to turn over your data When your cloud provider fails to adequately protect their network
Encrypt Everything
Encrypt your network traffic Encrypt your backups Encrypt your filesystems
Regulatory and Standards Compliance
Network Security
Firewall Rules Network Intrusion Detection
The purpose of a network intrusion detection system Implementing network intrusion detection in the cloud
Host Security
System Hardening Antivirus Protection Host Intrusion Detection Data Segmentation Credential Management
Compromise Response
6. Disaster Recovery
Disaster Recovery Planning
The Recovery Point Objective The Recovery Time Objective
Disasters in the Cloud
Backup Management
Fixed data strategy Configuration data strategy Persistent data strategy (aka database backups) Backup security
Geographic Redundancy
Spanning availability zones Operating across regions
Organizational Redundancy
Disaster Management
Monitoring Load Balancer Recovery Application Server Recovery Database Recovery
7. Scaling a Cloud Infrastructure
Capacity Planning
Expected Demand
Determining your expected demand Analyzing the unexpected
The Impact of Load
Application architecture and database architecture revisited Points of scale
The Value of Your Capacity
A simple thought experiment How might the outcome have been different?
Cloud Scale
Tools and Monitoring Systems
The procurement process in the cloud Managing proactive scaling Managing reactive scaling A recommended approach
Scaling Vertically
A. Amazon Web Services Reference
Amazon EC2 Command-Line Reference
ec2-add-group ec2-add-keypair ec2-allocate-address ec2-associate-address ec2-attach-volume ec2-authorize ec2-bundle-instance ec2-cancel-bundle-task ec2-confirm-product-instance ec2-create-snapshot ec2-create-volume ec2-delete-group ec2-delete-keypair ec2-delete-snapshot ec2-delete-volume ec2-deregister ec2-describe-addresses ec2-describe-availability-zones ec2-describe-bundle-tasks ec2-describe-group ec2-describe-image-attribute ec2-describe-images ec2-describe-instances ec2-describe-keypairs ec2-describe-regions ec2-describe-snapshots ec2-describe-volumes ec2-detach-volume ec2-disassociate-address ec2-get-console-output ec2-get-password ec2-modify-image-attribute ec2-reboot-instances ec2-release-address ec2-register ec2-reset-image-attribute ec2-revoke ec2-run-instances ec2-terminate-instances
Amazon EC2 Tips
Filesystem Encryption Setting Up RAID for Multiple EBS Volumes
B. GoGrid
Types of Clouds Cloudcenters in Detail
Data Centers in the Clouds GoGrid Versus Traditional Data Centers
Horizontal and vertical scaling GoGrid deployment architectures
Focus on Web Applications
Comparing Approaches
Side-by-Side Comparison Real-Life Usage
What’s Right for You?
C. Rackspace
Rackspace’s Cloud Services
Cloud Servers Cloud Files Cloud Sites
Fully Integrated, Backed by Fanatical Support
Index About the Author Colophon
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion