Muutke küpsiste eelistusi

Cloud Computing with Security: Concepts and Practices Second Edition 2020 [Pehme köide]

  • Formaat: Paperback / softback, 355 pages, kõrgus x laius: 235x155 mm, kaal: 611 g, 190 Illustrations, color; 16 Illustrations, black and white; XLIV, 355 p. 206 illus., 190 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 19-Sep-2020
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030246140
  • ISBN-13: 9783030246143
Teised raamatud teemal:
  • Pehme köide
  • Hind: 81,12 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 95,44 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 355 pages, kõrgus x laius: 235x155 mm, kaal: 611 g, 190 Illustrations, color; 16 Illustrations, black and white; XLIV, 355 p. 206 illus., 190 illus. in color., 1 Paperback / softback
  • Ilmumisaeg: 19-Sep-2020
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030246140
  • ISBN-13: 9783030246143
Teised raamatud teemal:

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc.  Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures.  The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic.  This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management.  Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.


1 Introduction
1(12)
1.1 Motivation
1(1)
1.2 Cloud Computing Definitions
2(1)
1.3 Cloud Computing Operational Characteristics
3(3)
1.3.1 Cloud Computing Benefits
5(1)
1.3.2 Cloud Computing Potential Risks
6(1)
1.4 Cloud Computing Trends
6(1)
1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure
7(1)
1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception
7(1)
1.4.3 Trend #3: Service-Level Agreements (SLAs)
7(1)
1.5 Cloud Computing Needs
7(1)
1.6 Information Security Needs
8(1)
1.7 Edge Computing and IoT Trends
9(1)
1.8 This Book's Organization
9(1)
1.9 Points to Ponder
10(3)
References
11(2)
2 Foundations of Cloud Computing and Information Security
13(36)
2.1 Historical Evolution
13(2)
2.2 Different Network Protocols
15(3)
2.3 Role of Internet Protocols in a Data Center
18(2)
2.4 Data Center Architecture and Connectivity
20(1)
2.5 Evolution of Enterprise IT
21(1)
2.6 Evolution of Web Services
22(4)
2.7 Server Operations in a Data Center
26(4)
2.8 Server-Based Web Services
30(1)
2.9 Evolution of Service-Oriented Architecture
31(2)
2.10 Transition from SOA to Cloud Computing
33(1)
2.11 Building an Enterprise SOA Solution
34(2)
2.12 Top-Down vs. Bottom-Up Approach
36(2)
2.13 Enterprise Service Bus (ESB)
38(1)
2.14 Enterprise Implementation on Private Cloud
39(2)
2.15 Enterprise Implementation on Hybrid Cloud
41(1)
2.16 Information Security Basic Concepts
41(2)
2.17 An Example of a Security Attack
43(1)
2.18 Cloud Software Security Requirements
44(2)
2.19 Rising Security Threats
46(1)
2.20 Summary
47(1)
2.21 Points to Ponder
47(2)
References
48(1)
3 Cloud Computing Pyramid
49(12)
3.1 Roots of Cloud Computing
49(3)
3.2 Essential Characteristics of Cloud Computing
52(1)
3.3 RoleofVirtualization
53(1)
3.4 Cloud Players and Their Concerns
54(2)
3.5 Considerations for Cloud Data Centers
56(2)
3.5.1 Migration
56(1)
3.5.2 Performance
57(1)
3.5.3 Security
57(1)
3.6 Points to Ponder
58(3)
References
59(2)
4 Features of Private and Public Cloud
61(14)
4.1 Customer Expectations of Cloud Computing
61(2)
4.2 Interoperability of Cloud Computing
63(1)
4.3 System Failures, Diagnostics, and Recovery
63(2)
4.4 Reliability of Cloud Computing
65(1)
4.5 Performance of Cloud Computing
66(1)
4.6 A Sample Study
67(4)
4.7 Security
71(1)
4.8 Summary
72(1)
4.9 Points to Ponder
72(3)
References
73(2)
5 Cloud Workload Characterization
75(24)
5.1 Motivation
75(1)
5.2 Some Background on Workload Characterization
76(3)
5.3 Top-Level Cloud Workload Categorization
79(1)
5.4 Cloud Workload Categories
80(4)
5.5 Computing Resources
84(2)
5.5.1 Data Busses Between Servers
85(1)
5.6 Example Workload Categorizations
86(1)
5.7 Temporal Variability of Workloads
86(4)
5.8 Low-Level or Hardware Metrics of Computer Utilization
90(1)
5.9 Dynamic Monitoring and Cloud Resource Allocation
91(1)
5.10 Benefits to Cloud Service Providers
92(2)
5.11 Summary
94(1)
5.12 Points to Ponder
95(4)
References
95(4)
6 Cloud Management and Monitoring
99(12)
6.1 Motivation
99(1)
6.2 Introduction to Cloud Setup and Basic Tools
99(1)
6.3 Noisy Neighbors in a Cloud
100(1)
6.4 Cloud Management Requirements
101(1)
6.5 Essentials of Monitoring
102(1)
6.6 Some Example of Monitoring Tools
103(2)
6.7 Monitoring Use of Images and Their Security
105(2)
6.8 Follow-ME Cloud
107(1)
6.9 Future Outlook
108(1)
6.10 Points to Ponder
109(2)
References
109(2)
7 Cloud Computing and Information Security
111(32)
7.1 Information Security Background, Information Context, and Definitions
111(2)
7.2 Evolution of Security Considerations
113(2)
7.3 Security Concerns of Cloud Operating Models
115(1)
7.4 Identity Authentication
116(4)
7.5 Secure Transmissions
120(1)
7.6 Secure Storage and Computation
121(1)
7.7 The Security Players
121(2)
7.8 Traditional vs. Internet Security Issues
123(2)
7.9 Security Using Encryption Keys
125(3)
7.10 Challenges of Using Standard Security Algorithms
128(1)
7.11 Variations and Special Cases for Security Issues with Cloud Computing
129(4)
7.11.1 The Players
130(1)
7.11.2 Secure Communication
131(1)
7.11.3 An Example of Security Scenario for Cloud Computing
131(2)
7.12 A Few Key Challenges Related to Cloud Computing and Virtualization
133(1)
7.13 Some Suggested Security Practices for Cloud Computing
134(2)
7.14 Side Channel Security Attacks in the Cloud
136(2)
7.15 An Introduction to Block Chain for Security
138(1)
7.16 Summary
139(1)
7.17 Points to Ponder
139(4)
References
140(3)
8 Migrating to Cloud
143(12)
8.1 Cloud Business Models
143(1)
8.2 A Case Study: B2C
144(1)
8.3 A Case Study: B2B
145(1)
8.4 A Case Study: C2C
146(2)
8.5 Plugging IoT Devices in a Cloud
148(3)
8.6 Using Multi-party Cloud
151(1)
8.7 Software-Based Hardware Security Modules
152(1)
8.8 Summary
153(1)
8.9 Points to Ponder
153(2)
References
154(1)
9 Migrating a Complex Industry to Cloud
155(18)
9.1 Background
155(1)
9.2 Introduction to EDA
156(1)
9.3 A Brief History of EDA Tools and Flows
157(3)
9.3.1 The Nascent Years of the 1970s
157(1)
9.3.2 The Roaring 1980s
158(1)
9.3.3 Growing Up in the 1990s
158(1)
9.3.4 Maturing into the First Decade of the Twenty-First Century
159(1)
9.3.5 From the 2010s Till Now: EDA Stable
159(1)
9.4 EDA Flow Steps Mapping to Cloud
160(5)
9.5 Considerations for Cloud Computing Adoption
165(3)
9.6 Applying Block Chain to Security
168(1)
9.7 Summary
169(1)
9.8 Points to Ponder
170(3)
References
170(3)
10 Cost and Billing Practices in Cloud
173(20)
10.1 Cloud as a Service (CaaS): The Billing Imperatives
173(1)
10.1.1 Cloud Business Practices
173(1)
10.2 Load Balancing
174(1)
10.3 Pay as You Go
175(1)
10.4 Amazon EC2 Motivations and Setup
176(3)
10.4.1 Amazon On-Demand Instances
177(1)
10.4.2 Amazon Spot Instances
177(1)
10.4.3 Amazon Reserved Instances
178(1)
10.4.4 Amazon Dedicated Instances and Dedicated Hosts
178(1)
10.5 Motivation and Methods for Right Sizing Customer VMs
179(3)
10.5.1 Elastic IP
179(1)
10.5.2 Elastic Load Balancing
180(1)
10.5.3 Auto Scaling
181(1)
10.6 Cost Minimization
182(3)
10.7 Capacity Forecasting
185(1)
10.8 Optimizations Across Cloud
186(2)
10.9 Types of Cloud Service-Level Agreements
188(2)
10.10 Summary
190(1)
10.11 Points to Ponder
190(3)
References
191(2)
11 Additional Security Considerations for Cloud
193(24)
11.1 Introduction
193(2)
11.2 Web Threat Models
195(1)
11.3 Open Web Application Security Project
196(2)
11.4 Emergence of Edge Computing
198(6)
11.4.1 Status of Edge Computing Security and Recent Breaches
199(1)
11.4.2 Security Modeling Specifically Targeting Edge Computing
200(4)
11.5 Security Solutions for IoT Devices
204(1)
11.6 Metrics for Access Control Using Speaker Identification
205(6)
11.7 Real-Time Control of Cyber-Physical Systems
211(3)
11.8 Summary
214(1)
11.9 Points to Ponder
214(3)
References
214(3)
12 Analytics in the Cloud
217(18)
12.1 Background and Problem Statement
217(2)
12.2 Introduction to MapReduce
219(2)
12.3 Introduction to Hadoop
221(1)
12.4 Usage of Amazon's MapReduce
222(3)
12.5 Twitter Sentimental Analysis Using Cloud
225(1)
12.6 IoT-Driven Analytics in Cloud
226(2)
12.7 Real-Time Decision-Making Support Systems
228(2)
12.8 Machine Learning in a Public Cloud
230(1)
12.9 Future Possibilities
231(1)
12.10 Points to Ponder
232(3)
References
232(3)
13 Future Trends in Cloud Computing
235(26)
13.1 Revisiting History of Computing
235(1)
13.2 Current Limitations of Cloud Computing
235(2)
13.3 Emergence of Internet of Things (IoT)
237(1)
13.4 Emergence of Machine Learning
238(2)
13.5 Emergence of Edge Computing
240(1)
13.6 Security Issues in Edge Computing
241(1)
13.7 Security Solutions for Edge Computing
242(2)
13.8 Example of an IoT-Based Cloud Service
244(2)
13.9 Hardware as the Root of Trust
246(1)
13.10 Security in Multi-party Cloud
247(1)
13.11 Privacy-Preserving Multi-party Analytics in a Cloud
248(2)
13.12 Hardware-Based Security Implementation
250(3)
13.13 Outsourced Computing Using Homomorphic Encryption
253(1)
13.14 Patching for Security
254(2)
13.15 Machine Learning for Security
256(1)
13.16 Future Work Needed
257(1)
13.17 Summary
257(1)
13.18 Points to Ponder
258(3)
References
258(3)
14 A Quick Test of Your Cloud Fundamentals Grasp
261(10)
14.1 Multiple Choice Questions
261(4)
14.2 Detailed Questions
265(1)
14.3 Answer Key for Multiple Choice Questions
266(1)
14.4 Answer Key for Detailed Questions
267(2)
14.5 Additional Challenging Questions
269(2)
15 Hands-On Project to Use Cloud Service Provider
271(44)
15.1 Project 1: Install Lamp Stack on Amazon EC2
271(21)
15.1.1 Installing Lamp Web Server on AWS via EC2
271(10)
15.1.2 Installing WordPress
281(10)
15.1.3 WordPress URL
291(1)
15.2 Project 2: Install PHP on Your AWS Instance
292(1)
15.3 Project 3: Enhance Security of Your Aws Instance
293(2)
15.4 Project 4: Set Up a Load Balancer for Your AWS Instance
295(6)
15.4.1 Elastic Load Balancer Setup
295(5)
15.4.2 Unique Features of AWS Load Balancer
300(1)
15.5 Project 5: Use Elastic IP for Your AWS Instance
301(11)
15.5.1 How to Make an Instance Elastic
301(1)
15.5.2 Extra: Elastic IP
301(1)
15.5.3 Bonus
302(10)
15.6 Points to Ponder
312(1)
15.7 Project 6: Encryption Strength of Key Size
312(3)
15.7.1 How to Evaluate Encryption Strength Based upon Factoring Keys
312(3)
Appendix A Points to Ponder 315(22)
Appendix B Additional Considerations for Cloud Computing 337(8)
Appendix C Suggested List of Additional Cloud Projects 345(2)
Appendix D Trust Models for IoT Devices 347(6)
Index 353
Naresh K. Sehgal has been working at Intel since 1988, prior to that completed his B.E. from Punjab Engineering College, M.S. and Ph.D. from Syracuse University. Naresh has taught a Cloud Computing class at Santa Clara University, where he also earned a MBA.

Pramod Chandra (PCP) Bhatt started his teaching career in 1965 at IIT Kanpur, and then moved to IIT Delhi in 1969, and retired from IIT Delhi in 1996. Prof Bhatt also worked as a visiting professor at the University of Ottawa, McGill University, Montreal (Canada), Universities of Dortmund, Paderborn and Bochum (Germany), and Kochi University of Technology (Japan).  Prof. Bhatt has a M.E. from Calcutta University and a PhD from IIT Kanpur. He has also been a Konrad Zuse Fellow at the University of Dortmund.

John M. Acken is a research faculty member in the Electrical and Computer Engineering Department, Portland State University, Portland, OR.  John received his BS and MS in Electrical Engineering from Oklahoma State University and Ph. D. in Electrical Engineering from Stanford University. His projects include technology and devices for information security and identity authentication. John has worked as an Electrical Engineer and Manager at several companies, including the US Army, Sandia National Labs in Albuquerque, New Mexico and Intel in Santa Clara, CA.  Johns time in the US Army was in the Army Security Agency, a branch of NSA during the Vietnam War.