دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [3 ed.] نویسندگان: Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken سری: ISBN (شابک) : 9783031072413, 9783031072420 ناشر: Springer سال نشر: 2023 تعداد صفحات: [417] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 13 Mb
در صورت تبدیل فایل کتاب Cloud Computing with Security and Scalability. Concepts and Practices به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب رایانش ابری با امنیت و مقیاس پذیری. مفاهیم و عملکردها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب یک مرور کلی از رایانش ابری را در اختیار خوانندگان قرار میدهد که با پیشینهای تاریخی در رایانههای اصلی و پروتکلهای شبکه اولیه شروع میشود و به نگرانیهای فعلی مانند امنیت سختافزار و سیستمها، عملکرد، حوزههای نوظهور اینترنت اشیا، محاسبات لبه، و مراقبتهای بهداشتی و غیره منجر میشود. از بحث عمیق استفاده از رایانش ابری و معماری های زیربنایی بهره مند شوید. نویسندگان به دقت «چرا و چگونه» رایانش ابری را توضیح میدهند، بنابراین مهندسان این کتاب را منبع ارزشمندی از اطلاعات برای موضوع خواهند یافت. این نسخه سوم شامل مطالب جدیدی در مورد مقیاس پذیری رایانش ابری و همچنین بهترین روش ها برای استفاده از زیرساخت های ابری پویا و مدیریت عملیات ابری با بهینه سازی هزینه است. چندین نمونه جدید و تحلیل امنیت ابری از جمله معماری ARM و پروتکل https اضافه شده است. راهنمایی عملی برای توسعه دهندگان نرم افزاری که درگیر مهاجرت برنامه های داخلی به Public Cloud هستند، ارائه می دهد. نحوه بهبود زیرساختهای رایانش ابری را برای مدیران فناوری اطلاعات توضیح میدهد. شامل پوشش نگرانی های امنیتی با مدل های عملیاتی Cloud است. از چندین مطالعه موردی برای نشان دادن \"چرا و چگونگی\" استفاده از Cloud استفاده می کند. مثالها و گزینههایی برای بهبود مقیاسپذیری رایانش ابری.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture and https protocol. Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud; Describes for IT managers how to improve their Cloud Computing infrastructures; Includes coverage of security concerns with Cloud operating models; Uses several case studies to illustrate the “why’s and how’s” of using the Cloud; Examples and options to improve Cloud Computing Scalability.
Foreword to the Third Edition Foreword to the Second Edition Foreword to the First Edition Foreword to the First Edition Preface to the Third Edition Preface to the Second Edition Preface to the First Edition Acknowledgments Contents Abbreviations Chapter 1: Introduction 1.1 Motivation 1.2 Cloud Computing Definitions 1.3 Cloud Computing Operational Characteristics 1.3.1 Cloud Computing Benefits 1.3.2 Cloud Computing Potential Risks 1.4 Cloud Computing Trends 1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure 1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception 1.4.3 Trend #3: Service-Level Agreements (SLAs) 1.5 Cloud Computing Needs 1.6 Information Security Needs 1.7 Edge Computing and IoT Trends 1.8 This Book’s Organization 1.9 Points to Ponder References Chapter 2: Foundations of Cloud Computing and Information Security 2.1 Historical Evolution 2.2 Different Network Protocols 2.3 Role of Internet Protocols in a Data Center 2.4 Data Center Architecture and Connectivity 2.5 Evolution of Enterprise IT 2.6 Evolution of Web Services 2.7 Server Operations in a Data Center 2.8 Server-Based Web Services 2.9 Evolution of Service-Oriented Architecture 2.10 Transition from SOA to Cloud Computing 2.11 Building an Enterprise SOA Solution 2.12 Top-Down vs. Bottom-Up Approach 2.13 Enterprise Service Bus (ESB) 2.14 Enterprise Implementation on Private Cloud 2.15 Enterprise Implementation on Hybrid Cloud 2.16 Information Security Basic Concepts 2.17 An Example of a Security Attack 2.18 Cloud Software Security Requirements 2.19 Rising Security Threats 2.20 Summary 2.21 Points to Ponder References Chapter 3: Cloud Computing Pyramid 3.1 Roots of Cloud Computing 3.2 Essential Characteristics of Cloud Computing 3.3 Role of Virtualization 3.4 Cloud Players and Their Concerns 3.5 Considerations for Cloud Data Centers 3.5.1 Migration 3.5.2 Performance 3.5.3 Security 3.6 Points to Ponder References Chapter 4: Features of Private and Public Cloud 4.1 Customer Expectations of Cloud Computing 4.2 Interoperability of Cloud Computing 4.3 System Failures, Diagnostics, and Recovery 4.4 Reliability of Cloud Computing 4.5 Performance of Cloud Computing 4.6 A Sample Study 4.7 Security 4.8 Summary 4.9 Points to Ponder References Chapter 5: Cloud Workload Characterization 5.1 Motivation 5.2 Some Background on Workload Characterization 5.3 Top-Level Cloud Workload Categorization 5.4 Cloud Workload Categories 5.5 Computing Resources 5.5.1 Data Busses Between Servers 5.6 Example Workload Categorizations 5.7 Temporal Variability of Workloads 5.8 Low-Level or Hardware Metrics of Computer Utilization 5.9 Dynamic Monitoring and Cloud Resource Allocation 5.10 Benefits to Cloud Service Providers 5.11 Summary 5.12 Points to Ponder References Chapter 6: Cloud Management and Monitoring 6.1 Motivation 6.2 Introduction to Cloud Setup and Basic Tools 6.3 Noisy Neighbors in a Cloud 6.4 Cloud Management Requirements 6.5 Essentials of Monitoring 6.6 Some Examples of Monitoring Tools 6.7 Monitoring Use of Images and Their Security 6.8 Follow-ME Cloud 6.9 Future Outlook 6.10 Points to Ponder References Chapter 7: Cloud Computing and Information Security 7.1 Information Security Background, Information Context, and Definitions 7.2 Evolution of Security Considerations 7.3 Security Concerns of Cloud Operating Models 7.4 Identity Authentication 7.5 Secure Transmissions 7.6 Secure Storage and Computation 7.7 The Security Players 7.8 Traditional vs. Internet Security Issues 7.9 Security Using Encryption Keys 7.10 Challenges of Using Standard Security Algorithms 7.11 Variations and Special Cases for Security Issues with Cloud Computing 7.11.1 The Players 7.11.2 Secure Communication 7.11.3 An Example of Security Scenario for Cloud Computing 7.12 A Few Key Challenges Related to Cloud Computing and Virtualization 7.13 Some Suggested Security Practices for Cloud Computing 7.14 Side Channel Security Attacks in the Cloud 7.15 An Introduction to Block Chain for Security 7.16 Summary 7.17 Points to Ponder References Chapter 8: Migrating to Cloud 8.1 Cloud Business Models 8.2 A Case Study: B2C 8.3 A Case Study: B2B 8.4 A Case Study: C2C 8.5 Plugging IoT Devices in a Cloud 8.6 Using Multi-party Cloud 8.7 Software-Based Hardware Security Modules 8.8 Summary 8.9 Points to Ponder References Chapter 9: Migrating a Complex Industry to Cloud 9.1 Background 9.2 Introduction to EDA 9.3 A Brief History of EDA Tools and Flows 9.3.1 The Nascent Years of the 1970s 9.3.2 The Roaring 1980s 9.3.3 Growing Up in the 1990s 9.3.4 Maturing into the First Decade of the Twenty-First Century 9.3.5 From the 2010s Till Now: EDA Stable 9.4 EDA Flow Steps Mapping to Cloud 9.5 Considerations for Cloud Computing Adoption 9.6 Applying Block Chain to Security 9.7 Summary 9.8 Points to Ponder References Chapter 10: Cost and Billing Practices in Cloud 10.1 Cloud as a Service (CaaS): The Billing Imperatives 10.1.1 Cloud Business Practices 10.2 Load Balancing 10.3 Pay As You Go 10.4 Amazon EC2 Motivations and Setup 10.4.1 Amazon On-Demand Instances 10.4.2 Amazon Spot Instances 10.4.3 Amazon Reserved Instances 10.4.4 Amazon Dedicated Instances and Dedicated Hosts 10.5 Motivation and Methods for Right Sizing Customer VMs 10.5.1 Elastic IP 10.5.2 Elastic Load Balancing 10.5.3 Auto Scaling 10.6 Cost Minimization 10.7 Capacity Forecasting 10.8 Optimizations Across Cloud 10.9 Types of Cloud Service-Level Agreements 10.10 Summary 10.11 Points to Ponder References Chapter 11: Additional Security Considerations for Cloud 11.1 Introduction 11.2 Web Threat Models 11.3 Open Web Application Security Project 11.4 Emergence of Edge Computing 11.4.1 Status of Edge Computing Security and Recent Breaches 11.4.2 Security Modeling Specifically Targeting Edge Computing 11.5 Security Solutions for IoT Devices 11.6 Metrics for Access Control Using Speaker Identification 11.7 Real-Time Control of Cyber-Physical Systems 11.8 Summary 11.9 Points to Ponder References Chapter 12: Analytics in the Cloud 12.1 Background and Problem Statement 12.2 Introduction to MapReduce 12.3 Introduction to Hadoop 12.4 Usage of Amazon’s MapReduce 12.5 Twitter Sentimental Analysis Using Cloud 12.6 IoT-Driven Analytics in Cloud 12.7 Real-Time Decision-Making Support Systems 12.8 Machine Learning in a Public Cloud 12.9 Future Possibilities 12.10 Points to Ponder References Chapter 13: Cloud Computing Scalability 13.1 A Historical Perspective 13.2 Scalability Implications of Remote Work 13.3 Framework for Scalability 13.4 Designing for Scalability 13.5 Cloud Computing Latency 13.5.1 Evolution of HTTP 13.6 Data Center Computations Scalability 13.7 Data Center Networking Scalability 13.8 Cloud Optimized Transport Protocols 13.9 Scalable Machine Learning Models in Cloud 13.10 Mixed-Mode Federated Learning Architecture 13.11 Cloud Cost Considerations 13.12 Summary 13.13 Points to Ponder References Chapter 14: Healthcare in the Cloud: Case Studies 14.1 Introduction 14.2 Existing TCD Solutions 14.3 Brain Health Data in Cloud 14.4 Accessing the Cloud 14.5 Trail of Bubbles 14.6 Heart Care Data in Cloud 14.7 Cloud-Based Collaborative Tools 14.8 UCSD Antibiogram: Using Unclassifiable Data 14.9 Multi-Cloud Solutions 14.10 Next Steps 14.11 Summary 14.12 Points to Ponder References Chapter 15: Future Trends in Cloud Computing 15.1 Introduction 15.2 Current Limitations of Cloud Computing 15.3 Emergence of Internet of Things (IoT) 15.4 Emergence of Machine Learning 15.5 Emergence of Edge Computing 15.6 Security Issues in Edge Computing 15.7 Security Solutions for Edge Computing 15.8 Example of an IoT-Based Cloud Service: Fog Computing 15.9 Hardware as the Root of Trust 15.10 Security in Multi-party Cloud 15.11 Privacy-Preserving Multi-party Analytics in a Cloud 15.12 Hardware-Based Security Implementation 15.13 Outsourced Computing Using Homomorphic Encryption 15.14 Patching for Security 15.15 Machine Learning for Security 15.16 Future Trends 15.17 Future Work Needed 15.18 Summary 15.19 Points to Ponder References Chapter 16: A Quick Test of Your Cloud Fundamentals Grasp 16.1 Multiple-Choice Questions 16.2 Detailed Questions 16.3 Answer Key for Multiple-Choice Questions 16.4 Answer Key for Detailed Questions 16.5 Additional Challenging Questions Chapter 17: Hands-On Project to Use Cloud Service Provider 17.1 Project 1: Install Lamp Stack on Amazon EC2 17.1.1 Installing Lamp Web Server on AWS via EC2 17.1.2 Installing WordPress 17.1.3 WordPress URL 17.2 Project 2: Install PHP on Your AWS Instance 17.3 Project 3: Enhance Security of Your AWS Instance 17.4 Project 4: Set Up a Load Balancer for Your AWS Instance 17.4.1 Elastic Load Balancer Setup 17.4.2 Unique Features of AWS Load Balancer 17.5 Project 5: Use Elastic IP for Your AWS Instance 17.5.1 How to Make an Instance Elastic 17.5.2 Extra: Elastic IP 17.5.3 Bonus 17.6 Points to Ponder 17.7 Project 6: Encryption Strength of Key Size 17.7.1 How to Evaluate Encryption Strength Based Upon Factoring Keys Appendices Appendix A: Points to Ponder Chapter #1: Points to Ponder Chapter #2: Points to Ponder Chapter #3: Points to Ponder Chapter #4: Points to Ponder Chapter #5: Points to Ponder Chapter #6: Points to Ponder Chapter #7: Points to Ponder Chapter #8: Points to Ponder Chapter #9: Points to Ponder Chapter #10: Points to Ponder Chapter #11: Points to Ponder Chapter #12: Points to Ponder Chapter# 13: Points to Ponder Chapter# 14: Points to Ponder Chapter #15: Points to Ponder Appendix B: Additional Considerations for Cloud Computing References Appendix C: Suggested List of Additional Cloud Projects Appendix D: Trust Models for IoT Devices An Example of Trust-Based Scoring References Index