Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.
Les mer
Foreword About the Authors Acknowledgments Chapter 1: Introduction 1.1 Objectives of This Book 1.2 What This Book Does Not Cover 1.3 Who This Book Is For 1.4 How This Book Is Organized     Part I: Fundamental Cloud Computing         Chapter 3: Understanding Cloud Computing         Chapter 4: Fundamental Concepts and Models         Chapter 5: Cloud-Enabling Technology         Chapter 6: Understanding Containerization         Chapter 7: Understanding Cloud Security and Cybersecurity     Part II: Cloud Computing Mechanisms         Chapter 8: Cloud Infrastructure Mechanisms         Chapter 9: Specialized Cloud Mechanisms         Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms         Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms         Chapter 12: Cloud Management Mechanisms     Part III: Cloud Computing Architecture         Chapter 13: Fundamental Cloud Architectures         Chapter 14: Advanced Cloud Architectures         Chapter 15: Specialized Cloud Architectures     Part IV: Working with Clouds         Chapter 16: Cloud Delivery Model Considerations         Chapter 17: Cost Metrics and Pricing Models         Chapter 18: Service Quality Metrics and SLAs     Part V: Appendices         Appendix A: Case Study Conclusions         Appendix B: Common Containerization Technologies 1.5 Resources     Pearson Digital Enterprise Book Series     Thomas Erl on YouTube         The Digital Enterprise Newsletter on LinkedIn     Cloud Certified Professional (CCP) ProgramChapter 2: Case Study Background 2.1 Case Study #1: ATN     Technical Infrastructure and Environment     Business Goals and New Strategy     Roadmap and Implementation Strategy 2.2 Case Study #2: DTGOV     Technical Infrastructure and Environment     Business Goals and New Strategy     Roadmap and Implementation Strategy 2.3 Case Study #3: Innovartus Technologies Inc.     Technical Infrastructure and Environment     Business Goals and Strategy     Roadmap and Implementation Strategy PART I: FUNDAMENTAL CLOUD COMPUTINGChapter 3: Understanding Cloud Computing 3.1 Origins and Influences     A Brief History     Definitions     Business Drivers         Cost Reduction         Business Agility     Technology Innovations         Clustering         Grid Computing         Capacity Planning         Virtualization         Containerization         Serverless Environments 3.2 Basic Concepts and Terminology     Cloud     Container     IT Resource     On Premises     Cloud Consumers and Cloud Providers     Scaling         Horizontal Scaling         Vertical Scaling     Cloud Service     Cloud Service Consumer 3.3 Goals and Benefits     Increased Responsiveness     Reduced Investments and Proportional Costs     Increased Scalability     Increased Availability and Reliability 3.4 Risks and Challenges     Increased Vulnerability Due to Overlapping Trust Boundaries     Increased Vulnerability Due to Shared Security Responsibility     Increased Exposure to Cyber Threats     Reduced Operational Governance Control     Limited Portability Between Cloud Providers     Multiregional Compliance and Legal Issues     Cost Overruns Chapter 4: Fundamental Concepts and Models 4.1 Roles and Boundaries     Cloud Provider     Cloud Consumer     Cloud Broker     Cloud Service Owner     Cloud Resource Administrator     Additional Roles     Organizational Boundary     Trust Boundary 4.2 Cloud Characteristics     On-Demand Usage     Ubiquitous Access     Multitenancy (and Resource Pooling)     Elasticity     Measured Usage     Resiliency 4.3 Cloud Delivery Models     Infrastructure as a Service (IaaS)     Platform as a Service (PaaS)     Software as a Service (SaaS)     Comparing Cloud Delivery Models     Combining Cloud Delivery Models         IaaS + PaaS         IaaS + PaaS + SaaS     Cloud Delivery Submodels 4.4 Cloud Deployment Models     Public Clouds     Private Clouds     Multiclouds     Hybrid Clouds Chapter 5: Cloud-Enabling Technology 5.1 Networks and Internet Architecture     Internet Service Providers (ISPs)     Connectionless Packet Switching (Datagram Networks)     Router-Based Interconnectivity         Physical Network         Transport Layer Protocol         Application Layer Protocol     Technical and Business Considerations         Connectivity Issues         Network Bandwidth and Latency Issues         Wireless and Cellular         Cloud Carrier and Cloud Provider Selection 5.2 Cloud Data Center Technology     Virtualization     Standardization and Modularity     Autonomic Computing     Remote Operation and Management     High Availability     Security-Aware Design, Operation, and Management     Facilities     Computing Hardware     Storage Hardware     Network Hardware         Carrier and External Networks Interconnection         Web-Tier Load Balancing and Acceleration         LAN Fabric         SAN Fabric         NAS Gateways     Serverless Environments     NoSQL Clustering     Other Considerations 5.3 Modern Virtualization     Hardware Independence     Server Consolidation     Resource Replication     Operating System–Based Virtualization     Hardware-Based Virtualization     Containers and Application-Based Virtualization     Virtualization Management     Other Considerations 5.4 Multitenant Technology 5.5 Service Technology and Service APIs     REST Services     Web Services     Service Agents     Service Middleware     Web-Based RPC 5.6 Case Study Example Chapter 6: Understanding Containerization 6.1 Origins and Influences     A Brief History     Containerization and Cloud Computing 6.2 Fundamental Virtualization and Containerization     Operating System Basics     Virtualization Basics         Physical Servers         Virtual Servers         Hypervisors         Virtualization Types     Containerization Basics         Containers         Container Images         Container Engines         Pods         Hosts         Host Clusters         Host Networks and Overlay Networks     Virtualization and Containerization         Containerization on Physical Servers         Containerization on Virtual Servers         Containerization Benefits         Containerization Risks and Challenges 6.3 Understanding Containers     Container Hosting     Containers and Pods     Container Instances and Clusters     Container Package Management     Container Orchestration     Container Package Manager vs. Container Orchestrator     Container Networks         Container Network Scope         Container Network Addresses     Rich Containers     Other Common Container Characteristics 6.4 Understanding Container Images     Container Image Types and Roles     Container Image Immutability     Container Image Abstraction         Operating System Kernel Abstraction         Operating System Abstraction Beyond the Kernel     Container Build Files         Container Image Layers     How Customized Container Images Are Created 6.5 Multi-Container Types     Sidecar Container     Adapter Container     Ambassador Container     Using Multi-Containers Together 6.6 Case Study Example Chapter 7: Understanding Cloud Security and Cybersecurity 7.1 Basic Security Terminology     Confidentiality     Integrity     Availability     Authenticity     Security Controls     Security Mechanisms     Security Policies 7.2 Basic Threat Terminology     Risk     Vulnerability     Exploit     Zero-Day Vulnerability     Security Breach     Data Breach     Data Leak     Threat (or Cyber Threat)     Attack (or Cyber Attack)     Attacker and Intruder     Attack Vector and Surface 7.3 Threat Agents     Anonymous Attacker     Malicious Service Agent     Trusted Attacker     Malicious Insider 7.4 Common Threats     Traffic Eavesdropping     Malicious Intermediary     Denial of Service     Insufficient Authorization     Virtualization Attack     Overlapping Trust Boundaries     Containerization Attack     Malware     Insider Threat     Social Engineering and Phishing     Botnet     Privilege Escalation     Brute Force     Remote Code Execution     SQL Injection     Tunneling     Advanced Persistent Threat (APT) 7.5 Case Study Example 7.6 Additional Considerations     Flawed Implementations     Security Policy Disparity     Contracts     Risk Management 7.7 Case Study Example PART II: CLOUD COMPUTING MECHANISMS Chapter 8: Cloud Infrastructure Mechanisms 8.1 Logical Network Perimeter     Case Study Example 8.2 Virtual Server     Case Study Example 8.3 Hypervisor     Case Study Example 8.4 Cloud Storage Device     Cloud Storage Levels     Network Storage Interfaces     Object Storage Interfaces     Database Storage Interfaces         Relational Data Storage         Non-Relational Data Storage     Case Study Example 8.5 Cloud Usage Monitor     Monitoring Agent     Resource Agent     Polling Agent     Case Study Example 8.6 Resource Replication     Case Study Example 8.7 Ready-Made Environment     Case Study Example 8.8 Container Chapter 9: Specialized Cloud Mechanisms 9.1 Automated Scaling Listener     Case Study Example 9.2 Load Balancer     Case Study Example 9.3 SLA Monitor     Case Study Example         SLA Monitor Polling Agent         SLA Monitoring Agent 9.4 Pay-Per-Use Monitor     Case Study Example 9.5 Audit Monitor     Case Study Example 9.6 Failover System     Active–Active     Active–Passive     Case Study Example 9.7 Resource Cluster     Case Study Example 9.8 Multi-Device Broker     Case Study Example 9.9 State Management Database     Case Study ExampleChapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms 10.1 Encryption     Symmetric Encryption     Asymmetric Encryption     Case Study Example 10.2 Hashing     Case Study Example 10.3 Digital Signature     Case Study Example 10.4 Cloud-Based Security Groups     Case Study Example 10.5 Public Key Infrastructure (PKI) System     Case Study Example 10.6 Single Sign-On (SSO) System     Case Study Example 10.7 Hardened Virtual Server Image     Case Study Example 10.8 Firewall     Case Study Example 10.9 Virtual Private Network (VPN)     Case Study Example 10.10 Biometric Scanner     Case Study Example 10.11 Multi-Factor Authentication (MFA) System     Case Study Example 10.12 Identity and Access Management (IAM) System     Case Study Example 10.13 Intrusion Detection System (IDS)     Case Study Example 10.14 Penetration Testing Tool     Case Study Example 10.15 User Behavior Analytics (UBA) System     Case Study Example 10.16 Third-Party Software Update Utility     Case Study Example 10.17 Network Intrusion Monitor     Case Study Example 10.18 Authentication Log Monitor     Case Study Example 10.19 VPN Monitor     Case Study Example 10.20 Additional Cloud Security Access-Oriented Practices and Technologies Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms 11.1 Digital Virus Scanning and Decryption System     Generic Decryption     Digital Immune System     Case Study Example 11.2 Malicious Code Analysis System     Case Study Example 11.3 Data Loss Prevention (DLP) System     Case Study Example 11.4 Trusted Platform Module (TPM)     Case Study Example 11.5 Data Backup and Recovery System     Case Study Example 11.6 Activity Log Monitor     Case Study Example 11.7 Traffic Monitor     Case Study Example 11.8 Data Loss Protection Monitor     Case Study Example Chapter 12: Cloud Management Mechanisms 12.1 Remote Administration System     Case Study Example 12.2 Resource Management System     Case Study Example 12.3 SLA Management System     Case Study Example 12.4 Billing Management System     Case Study Example PART III: CLOUD COMPUTING ARCHITECTURE Chapter 13: Fundamental Cloud Architectures 13.1 Workload Distribution Architecture 13.2 Resource Pooling Architecture 13.3 Dynamic Scalability Architecture 13.4 Elastic Resource Capacity Architecture 13.5 Service Load Balancing Architecture 13.6 Cloud Bursting Architecture 13.7 Elastic Disk Provisioning Architecture 13.8 Redundant Storage Architecture 13.9 Multicloud Architecture 13.10 Case Study ExampleChapter 14: Advanced Cloud Architectures 14.1 Hypervisor Clustering Architecture 14.2 Virtual Server Clustering Architecture 14.3 Load-Balanced Virtual Server Instances Architecture 14.4 Nondisruptive Service Relocation Architecture 14.5 Zero Downtime Architecture 14.6 Cloud Balancing Architecture 14.7 Resilient Disaster Recovery Architecture 14.8 Distributed Data Sovereignty Architecture 14.9 Resource Reservation Architecture 14.10 Dynamic Failure Detection and Recovery Architecture 14.11 Rapid Provisioning Architecture 14.12 Storage Workload Management Architecture 14.13 Virtual Private Cloud Architecture 14.14 Case Study ExampleChapter 15: Specialized Cloud Architectures 15.1 Direct I/O Access Architecture 15.2 Direct LUN Access Architecture 15.3 Dynamic Data Normalization Architecture 15.4 Elastic Network Capacity Architecture 15.5 Cross-Storage Device Vertical Tiering Architecture 15.6 Intra-Storage Device Vertical Data Tiering Architecture 15.7 Load-Balanced Virtual Switches Architecture 15.8 Multipath Resource Access Architecture 15.9 Persistent Virtual Network Configuration Architecture 15.10 Redundant Physical Connection for Virtual Servers Architecture 15.11 Storage Maintenance Window Architecture 15.12 Edge Computing Architecture 15.13 Fog Computing Architecture 15.14 Virtual Data Abstraction Architecture 15.15 Metacloud Architecture 15.16 Federated Cloud Application Architecture PART IV: WORKING WITH CLOUDS Chapter 16: Cloud Delivery Model Considerations 16.1 Cloud Delivery Models: The Cloud Provider Perspective     Building IaaS Environments         Data Centers         Scalability and Reliability         Monitoring         Security     Equipping PaaS Environments         Scalability and Reliability         Monitoring         Security     Optimizing SaaS Environments         Security 16.2 Cloud Delivery Models: The Cloud Consumer Perspective     Working with IaaS Environments         IT Resource Provisioning Considerations     Working with PaaS Environments         IT Resource Provisioning Considerations     Working with SaaS Services 16.3 Case Study Example Chapter 17: Cost Metrics and Pricing Models 17.1 Business Cost Metrics     Up-Front and Ongoing Costs     Additional Costs Case Study Example     Product Catalog Browser         On-Premises Up-Front Costs         On-Premises Ongoing Costs         Cloud-Based Up-Front Costs         Cloud-Based Ongoing Costs 17.2 Cloud Usage Cost Metrics     Network Usage         Inbound Network Usage Metric         Outbound Network Usage Metric         Intra-Cloud WAN Usage Metric     Server Usage         On-Demand Virtual Machine Instance Allocation Metric         Reserved Virtual Machine Instance Allocation Metric     Cloud Storage Device Usage         On-Demand Storage Space Allocation Metric         I/O Data Transferred Metric     Cloud Service Usage         Application Subscription Duration Metric         Number of Nominated Users Metric         Number of Transactions Users Metric 17.3 Cost Management Considerations     Pricing Models     Multicloud Cost Management     Additional Considerations Case Study Example     Virtual Server On-Demand Instance Allocation     Virtual Server Reserved Instance Allocation     Cloud Storage Device     WAN Traffic Chapter 18: Service Quality Metrics and SLAs 18.1 Service Quality Metrics     Service Availability Metrics         Availability Rate Metric         Outage Duration Metric     Service Reliability Metrics         Mean Time Between Failures (MTBF) Metric         Reliability Rate Metric     Service Performance Metrics         Network Capacity Metric         Storage Device Capacity Metric         Server Capacity Metric         Web Application Capacity Metric         Instance Starting Time Metric         Response Time Metric         Completion Time Metric     Service Scalability Metrics         Storage Scalability (Horizontal) Metric         Server Scalability (Horizontal) Metric         Server Scalability (Vertical) Metric     Service Resiliency Metrics         Mean Time to Switchover (MTSO) Metric         Mean Time to System Recovery (MTSR) Metric 18.2 Case Study Example 18.3 SLA Guidelines 18.4 Case Study Example         Scope and Applicability         Service Quality Guarantees         Definitions         Usage of Financial Credits         SLA Exclusions PART V: APPENDICES Appendix A: Case Study Conclusions A.1 ATN A.2 DTGOV A.3 Innovartus Appendix B: Common Containerization Technologies B.1 Docker     Docker Server     Docker Client     Docker Registry     Docker Objects     Docker Swarm (Container Orchestrator) B.2 Kubernetes     Kubernetes Node (Host)     Kubernetes Pod     Kubelet     Kube-Proxy     Container Runtime (Container Engine)     Cluster     Kubernetes Control Plane 9780138052256    TOC    7/17/2023
Les mer
Cloud computing demystified: well-defined concepts, models, and technology mechanisms for every practitioner, professional, decision-maker, and student. The definitive technical reference for today's cloud computing platforms and solutions: careful structure, exceptional clarity, and concrete building blocksCovers delivery/deployment models, enabling technologies, security, economic and technical metrics, contracts, and moreLead-authored by Thomas Erl, founder of CloudSchool.com™ and the world's best-selling service technology author for five years
Les mer
Updated for the latest version of the text.

Produktdetaljer

ISBN
9780138052256
Publisert
2023-10-24
Utgave
2. utgave
Utgiver
Vendor
Pearson
Vekt
1035 gr
Høyde
234 mm
Bredde
180 mm
Dybde
3 mm
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
608

Om bidragsyterne

Thomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel (youtube.com/@terl). He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events.

At Arcitura Education (www.arcitura.com), Thomas leads the development of curricula for internationally recognized, vendor-neutral training and accreditation programs. Arcitura's portfolio currently consists of over 100 courses, over 100 Pearson VUE exams, and over 40 certification tracks, covering topics such as Cloud Computing Architecture, Security, and Governance, as well as Digital Transformation, Robotic Process Automation (RPA), DevOps, Blockchain, IoT, Containerization, Machine Learning, Artificial Intelligence (AI), Cybersecurity, Service-Oriented Architecture (SOA), and Big Data Analytics. Thomas is also the founder and senior advisor at Transformative Digital Solutions (www.transformative.digital) and a freelance LinkedIn instructor and courseware author.

www.thomaserl.com

 

Eric Barceló Monroy is an IT professional with extensive experience in IT strategic planning, operational and administrative process reengineering, system implementation project management, and IT operations. He has a proven track record of implementing systems that exceed user expectations while reducing costs and improving response times. He has held various high-level positions in both the private and public sectors, including Director of Information Technology at Farmacéuticos MAYPO, a pharmaceutical distributor; Vice-president of Telecommunications and Technology Operations at iExplore, an internet-based adventure travel agency; and Director of Information Technology and Telecommunications at the Ministry of Education in Tabasco, Mexico, where he oversaw the implementation of telecommunication networks among schools and develops and delivers computer literacy training programs for faculty.

Additionally, he is a partner and Technical Consulting Director at EGN, a cloud technology consulting and training firm, where he provides IT consultancy on state of-theart topics like Big Data, Cloud Computing, Virtualization, Advanced Networking, and Strategic IT Management. Eric is a Certified Cloud Computing Technology Professional, Certified Cloud Virtualization Specialist, and Certified Cloud Architect, among others. He is also a VMware Certified Professional, Red Hat Certified System Administrator, Red Hat Certified Engineer, and Certified Amazon Web Services Solutions Architect.