Cloud Computing
Concepts, Technology, Security, and Architecture
Häftad, Engelska, 2023
799 kr
Cloud Computing: Concepts, Technology, Security & Architecture
Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services.
In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included.
All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.
Produktinformation
- Utgivningsdatum2023-10-24
- Mått180 x 34 x 232 mm
- Vikt1 035 g
- FormatHäftad
- SpråkEngelska
- SerieThe Pearson Digital Enterprise Series from Thomas Erl
- Antal sidor608
- Upplaga2
- FörlagPearson Education
- ISBN9780138052256
Tillhör följande kategorier
Thomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel (youtube.com/@terl). He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events.At Arcitura Education (www.arcitura.com), Thomas leads the development of curricula for internationally recognized, vendor-neutral training and accreditation programs. Arcitura's portfolio currently consists of over 100 courses, over 100 Pearson VUE exams, and over 40 certification tracks, covering topics such as Cloud Computing Architecture, Security, and Governance, as well as Digital Transformation, Robotic Process Automation (RPA), DevOps, Blockchain, IoT, Containerization, Machine Learning, Artificial Intelligence (AI), Cybersecurity, Service-Oriented Architecture (SOA), and Big Data Analytics. Thomas is also the founder and senior advisor at Transformative Digital Solutions (www.transformative.digital) and a freelance LinkedIn instructor and courseware author.www.thomaserl.com Eric Barceló Monroy is an IT professional with extensive experience in IT strategic planning, operational and administrative process reengineering, system implementation project management, and IT operations. He has a proven track record of implementing systems that exceed user expectations while reducing costs and improving response times. He has held various high-level positions in both the private and public sectors, including Director of Information Technology at Farmacéuticos MAYPO, a pharmaceutical distributor; Vice-president of Telecommunications and Technology Operations at iExplore, an internet-based adventure travel agency; and Director of Information Technology and Telecommunications at the Ministry of Education in Tabasco, Mexico, where he oversaw the implementation of telecommunication networks among schools and develops and delivers computer literacy training programs for faculty.Additionally, he is a partner and Technical Consulting Director at EGN, a cloud technology consulting and training firm, where he provides IT consultancy on state of-theart topics like Big Data, Cloud Computing, Virtualization, Advanced Networking, and Strategic IT Management. Eric is a Certified Cloud Computing Technology Professional, Certified Cloud Virtualization Specialist, and Certified Cloud Architect, among others. He is also a VMware Certified Professional, Red Hat Certified System Administrator, Red Hat Certified Engineer, and Certified Amazon Web Services Solutions Architect.
- Foreword About the Authors Acknowledgments Chapter 1: Introduction 1.1 Objectives of This Book1.2 What This Book Does Not Cover1.3 Who This Book Is For1.4 How This Book Is OrganizedPart I: Fundamental Cloud ComputingChapter 3: Understanding Cloud ComputingChapter 4: Fundamental Concepts and Models Chapter 5: Cloud-Enabling TechnologyChapter 6: Understanding Containerization Chapter 7: Understanding Cloud Security and Cybersecurity Part II: Cloud Computing MechanismsChapter 8: Cloud Infrastructure MechanismsChapter 9: Specialized Cloud MechanismsChapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms Chapter 11: Cloud Security and Cybersecurity Data-Oriented MechanismsChapter 12: Cloud Management MechanismsPart III: Cloud Computing Architecture Chapter 13: Fundamental Cloud ArchitecturesChapter 14: Advanced Cloud ArchitecturesChapter 15: Specialized Cloud ArchitecturesPart IV: Working with CloudsChapter 16: Cloud Delivery Model ConsiderationsChapter 17: Cost Metrics and Pricing ModelsChapter 18: Service Quality Metrics and SLAsPart V: AppendicesAppendix A: Case Study Conclusions Appendix B: Common Containerization Technologies1.5 ResourcesPearson Digital Enterprise Book SeriesThomas Erl on YouTubeThe Digital Enterprise Newsletter on LinkedInCloud Certified Professional (CCP) ProgramChapter 2: Case Study Background2.1 Case Study #1: ATNTechnical Infrastructure and EnvironmentBusiness Goals and New Strategy Roadmap and Implementation Strategy 2.2 Case Study #2: DTGOV Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy 2.3 Case Study #3: Innovartus Technologies Inc.Technical Infrastructure and Environment Business Goals and Strategy Roadmap and Implementation Strategy PART I: FUNDAMENTAL CLOUD COMPUTINGChapter 3: Understanding Cloud Computing3.1 Origins and Influences A Brief HistoryDefinitionsBusiness Drivers Cost ReductionBusiness AgilityTechnology Innovations Clustering Grid Computing Capacity PlanningVirtualization Containerization Serverless Environments3.2 Basic Concepts and Terminology Cloud Container IT ResourceOn PremisesCloud Consumers and Cloud ProvidersScalingHorizontal Scaling Vertical Scaling Cloud Service Cloud Service Consumer 3.3 Goals and Benefits Increased Responsiveness Reduced Investments and Proportional Costs Increased ScalabilityIncreased Availability and Reliability 3.4 Risks and ChallengesIncreased Vulnerability Due to Overlapping Trust Boundaries Increased Vulnerability Due to Shared Security ResponsibilityIncreased Exposure to Cyber Threats Reduced Operational Governance Control Limited Portability Between Cloud Providers Multiregional Compliance and Legal IssuesCost Overruns Chapter 4: Fundamental Concepts and Models4.1 Roles and Boundaries Cloud Provider Cloud ConsumerCloud Broker Cloud Service Owner Cloud Resource Administrator Additional RolesOrganizational Boundary Trust Boundary4.2 Cloud Characteristics On-Demand Usage Ubiquitous AccessMultitenancy (and Resource Pooling)Elasticity Measured Usage Resiliency4.3 Cloud Delivery Models Infrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)Comparing Cloud Delivery Models Combining Cloud Delivery ModelsIaaS + PaaSIaaS + PaaS + SaaS Cloud Delivery Submodels 4.4 Cloud Deployment ModelsPublic Clouds Private CloudsMulticloudsHybrid Clouds Chapter 5: Cloud-Enabling Technology5.1 Networks and Internet Architecture Internet Service Providers (ISPs)Connectionless Packet Switching (Datagram Networks)Router-Based Interconnectivity Physical NetworkTransport Layer Protocol Application Layer ProtocolTechnical and Business Considerations Connectivity Issues Network Bandwidth and Latency Issues Wireless and Cellular Cloud Carrier and Cloud Provider Selection 5.2 Cloud Data Center Technology Virtualization Standardization and Modularity Autonomic Computing Remote Operation and Management High Availability Security-Aware Design, Operation, and Management Facilities Computing Hardware Storage Hardware Network HardwareCarrier and External Networks InterconnectionWeb-Tier Load Balancing and AccelerationLAN FabricSAN FabricNAS Gateways Serverless Environments NoSQL Clustering Other Considerations 5.3 Modern VirtualizationHardware IndependenceServer Consolidation Resource ReplicationOperating System–Based Virtualization Hardware-Based Virtualization Containers and Application-Based Virtualization Virtualization Management Other Considerations 5.4 Multitenant Technology 5.5 Service Technology and Service APIs REST Services Web ServicesService AgentsService Middleware Web-Based RPC 5.6 Case Study Example Chapter 6: Understanding Containerization6.1 Origins and Influences A Brief History Containerization and Cloud Computing 6.2 Fundamental Virtualization and Containerization Operating System Basics Virtualization BasicsPhysical ServersVirtual Servers HypervisorsVirtualization Types Containerization BasicsContainers Container Images Container EnginesPods HostsHost Clusters Host Networks and Overlay Networks Virtualization and Containerization Containerization on Physical Servers Containerization on Virtual Servers Containerization Benefits Containerization Risks and Challenges 6.3 Understanding Containers Container HostingContainers and Pods Container Instances and Clusters Container Package ManagementContainer Orchestration Container Package Manager vs. Container Orchestrator Container Networks Container Network Scope Container Network Addresses Rich Containers Other Common Container Characteristics 6.4 Understanding Container Images Container Image Types and RolesContainer Image ImmutabilityContainer Image AbstractionOperating System Kernel Abstraction Operating System Abstraction Beyond the Kernel Container Build Files Container Image Layers How Customized Container Images Are Created 6.5 Multi-Container Types Sidecar ContainerAdapter ContainerAmbassador Container Using Multi-Containers Together6.6 Case Study Example Chapter 7: Understanding Cloud Security and Cybersecurity 7.1 Basic Security Terminology Confidentiality Integrity Availability AuthenticitySecurity Controls Security Mechanisms Security Policies 7.2 Basic Threat Terminology Risk Vulnerability ExploitZero-Day Vulnerability Security Breach Data Breach Data LeakThreat (or Cyber Threat)Attack (or Cyber Attack)Attacker and IntruderAttack Vector and Surface 7.3 Threat Agents Anonymous Attacker Malicious Service Agent Trusted AttackerMalicious Insider7.4 Common ThreatsTraffic EavesdroppingMalicious IntermediaryDenial of Service Insufficient Authorization Virtualization Attack Overlapping Trust Boundaries Containerization Attack Malware Insider Threat Social Engineering and Phishing Botnet Privilege Escalation Brute Force Remote Code Execution SQL Injection Tunneling Advanced Persistent Threat (APT)7.5 Case Study Example 7.6 Additional Considerations Flawed ImplementationsSecurity Policy DisparityContracts Risk Management 7.7 Case Study Example PART II: CLOUD COMPUTING MECHANISMS Chapter 8: Cloud Infrastructure Mechanisms8.1 Logical Network Perimeter Case Study Example 8.2 Virtual Server Case Study Example 8.3 HypervisorCase Study Example 8.4 Cloud Storage DeviceCloud Storage LevelsNetwork Storage Interfaces Object Storage InterfacesDatabase Storage Interfaces Relational Data Storage Non-Relational Data Storage Case Study Example 8.5 Cloud Usage MonitorMonitoring Agent Resource Agent Polling Agent Case Study Example 8.6 Resource ReplicationCase Study Example8.7 Ready-Made Environment Case Study Example 8.8 Container Chapter 9: Specialized Cloud Mechanisms9.1 Automated Scaling Listener Case Study Example9.2 Load Balancer Case Study Example 9.3 SLA MonitorCase Study Example SLA Monitor Polling Agent SLA Monitoring Agent9.4 Pay-Per-Use Monitor Case Study Example9.5 Audit Monitor Case Study Example 9.6 Failover System Active–ActiveActive–Passive Case Study Example 9.7 Resource Cluster Case Study Example 9.8 Multi-Device BrokerCase Study Example9.9 State Management DatabaseCase Study ExampleChapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms10.1 EncryptionSymmetric Encryption Asymmetric EncryptionCase Study Example 10.2 Hashing Case Study Example 10.3 Digital SignatureCase Study Example 10.4 Cloud-Based Security Groups Case Study Example 10.5 Public Key Infrastructure (PKI) System Case Study Example 10.6 Single Sign-On (SSO) System Case Study Example 10.7 Hardened Virtual Server Image Case Study Example 10.8 Firewall Case Study Example 10.9 Virtual Private Network (VPN)Case Study Example 10.10 Biometric ScannerCase Study Example 10.11 Multi-Factor Authentication (MFA) System Case Study Example 10.12 Identity and Access Management (IAM) System Case Study Example 10.13 Intrusion Detection System (IDS)Case Study Example 10.14 Penetration Testing Tool Case Study Example 10.15 User Behavior Analytics (UBA) System Case Study Example 10.16 Third-Party Software Update Utility Case Study Example 10.17 Network Intrusion Monitor Case Study Example 10.18 Authentication Log Monitor Case Study Example 10.19 VPN Monitor Case Study Example 10.20 Additional Cloud Security Access-Oriented Practices and Technologies Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms11.1 Digital Virus Scanning and Decryption System Generic Decryption Digital Immune System Case Study Example11.2 Malicious Code Analysis System Case Study Example 11.3 Data Loss Prevention (DLP) System Case Study Example 11.4 Trusted Platform Module (TPM)Case Study Example 11.5 Data Backup and Recovery System Case Study Example11.6 Activity Log Monitor Case Study Example11.7 Traffic Monitor Case Study Example 11.8 Data Loss Protection Monitor Case Study Example Chapter 12: Cloud Management Mechanisms12.1 Remote Administration System Case Study Example 12.2 Resource Management System Case Study Example 12.3 SLA Management System Case Study Example12.4 Billing Management System Case Study Example PART III: CLOUD COMPUTING ARCHITECTURE Chapter 13: Fundamental Cloud Architectures13.1 Workload Distribution Architecture 13.2 Resource Pooling Architecture 13.3 Dynamic Scalability Architecture13.4 Elastic Resource Capacity Architecture 13.5 Service Load Balancing Architecture13.6 Cloud Bursting Architecture 13.7 Elastic Disk Provisioning Architecture 13.8 Redundant Storage Architecture 13.9 Multicloud Architecture 13.10 Case Study ExampleChapter 14: Advanced Cloud Architectures14.1 Hypervisor Clustering Architecture 14.2 Virtual Server Clustering Architecture14.3 Load-Balanced Virtual Server Instances Architecture 14.4 Nondisruptive Service Relocation Architecture 14.5 Zero Downtime Architecture 14.6 Cloud Balancing Architecture14.7 Resilient Disaster Recovery Architecture 14.8 Distributed Data Sovereignty Architecture14.9 Resource Reservation Architecture 14.10 Dynamic Failure Detection and Recovery Architecture 14.11 Rapid Provisioning Architecture 14.12 Storage Workload Management Architecture 14.13 Virtual Private Cloud Architecture 14.14 Case Study ExampleChapter 15: Specialized Cloud Architectures15.1 Direct I/O Access Architecture 15.2 Direct LUN Access Architecture15.3 Dynamic Data Normalization Architecture 15.4 Elastic Network Capacity Architecture15.5 Cross-Storage Device Vertical Tiering Architecture 15.6 Intra-Storage Device Vertical Data Tiering Architecture15.7 Load-Balanced Virtual Switches Architecture 15.8 Multipath Resource Access Architecture15.9 Persistent Virtual Network Configuration Architecture 15.10 Redundant Physical Connection for Virtual Servers Architecture 15.11 Storage Maintenance Window Architecture15.12 Edge Computing Architecture 15.13 Fog Computing Architecture15.14 Virtual Data Abstraction Architecture 15.15 Metacloud Architecture15.16 Federated Cloud Application Architecture PART IV: WORKING WITH CLOUDSChapter 16: Cloud Delivery Model Considerations16.1 Cloud Delivery Models: The Cloud Provider PerspectiveBuilding IaaS Environments Data Centers Scalability and Reliability Monitoring SecurityEquipping PaaS Environments Scalability and ReliabilityMonitoringSecurity Optimizing SaaS Environments Security 16.2 Cloud Delivery Models: The Cloud Consumer Perspective Working with IaaS Environments IT Resource Provisioning Considerations Working with PaaS Environments IT Resource Provisioning Considerations Working with SaaS Services16.3 Case Study Example Chapter 17: Cost Metrics and Pricing Models17.1 Business Cost Metrics Up-Front and Ongoing Costs Additional Costs Case Study ExampleProduct Catalog Browser On-Premises Up-Front Costs On-Premises Ongoing CostsCloud-Based Up-Front CostsCloud-Based Ongoing Costs 17.2 Cloud Usage Cost Metrics Network Usage Inbound Network Usage Metric Outbound Network Usage Metric Intra-Cloud WAN Usage Metric Server Usage On-Demand Virtual Machine Instance Allocation Metric Reserved Virtual Machine Instance Allocation Metric Cloud Storage Device Usage On-Demand Storage Space Allocation Metric I/O Data Transferred Metric Cloud Service Usage Application Subscription Duration Metric Number of Nominated Users Metric Number of Transactions Users Metric 17.3 Cost Management Considerations Pricing Models Multicloud Cost Management Additional Considerations Case Study Example Virtual Server On-Demand Instance Allocation Virtual Server Reserved Instance Allocation Cloud Storage Device WAN Traffic Chapter 18: Service Quality Metrics and SLAs18.1 Service Quality Metrics Service Availability MetricsAvailability Rate Metric Outage Duration MetricService Reliability Metrics Mean Time Between Failures (MTBF) Metric Reliability Rate Metric Service Performance Metrics Network Capacity Metric Storage Device Capacity Metric Server Capacity Metric Web Application Capacity Metric Instance Starting Time MetricResponse Time Metric Completion Time MetricService Scalability Metrics Storage Scalability (Horizontal) MetricServer Scalability (Horizontal) MetricServer Scalability (Vertical) Metric Service Resiliency Metrics Mean Time to Switchover (MTSO) Metric Mean Time to System Recovery (MTSR) Metric 18.2 Case Study Example 18.3 SLA Guidelines 18.4 Case Study Example Scope and Applicability Service Quality Guarantees Definitions Usage of Financial Credits SLA Exclusions PART V: APPENDICES Appendix A: Case Study ConclusionsA.1 ATN A.2 DTGOVA.3 Innovartus Appendix B: Common Containerization Technologies B.1 Docker Docker Server Docker ClientDocker Registry Docker Objects Docker Swarm (Container Orchestrator)B.2 Kubernetes Kubernetes Node (Host)Kubernetes Pod Kubelet Kube-Proxy Container Runtime (Container Engine)Cluster Kubernetes Control Plane 9780138052256 TOC 7/17/2023