Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Cloud management and security /

Abbadi, Imad M.,

Cloud management and security / Imad M. Abbadi. - New Delhi : Wiley, 2015. - xxii, 216 pages ; 24 cm.

computer bookfair2016

Includes bibliographical references and index.

Preface

References



1 Introduction

1.1 Overview

1.2 Cloud definition

1.3 Cloud evolution

1.4 Cloud services

1.5 Cloud deployment types

1.6 Main challenges of Clouds

1.7 Summary

1.8 Exercises



Part One Cloud management

2 Cloud Structure

2.1 Introduction

2.2 Infrastructure components

2.3 Cloud Layers

2.4 Cloud relations

2.5 Cloud dynamics

2.6 Data types

2.7 Summary

2.8 Exercises



3 Fundamentals of Cloud management

3.1 Introduction

3.2 Clouds management services

3.3 Virtual control center

3.4 Prerequisite input-data for the management services

3.5 Management of user requirements

3.6 Summary

3.7 Exercises



4 Cloud properties

4.1 Introduction

4.2 Adaptability property

4.3 Resilience property

4.4 Scalability property

4.5 Availability property

4.6 Reliability property

4.7 Security and privacy property

4.8 Business model

4.9 Summary

4.10 Exercises



5 Automated management services

5.1 Introduction

5.2 Virtual layer self-managed services

5.3 Virtual services interdependency

5.4 Application layer self-managed services

5.5 Application services interdependency

5.6 Security and privacy by design

5.7 Multi-tier application deployment in the Cloud

5.8 Main challenges and requirements

5.9 Summary

5.10 Exercises



Part Two Clouds security fundamentals

6 Background

6.1 Topics flow

6.2 Trusted Computing

6.3 Summary



7 Challenges for establishing trust in Clouds

7.1 Introduction

7.2 Effects of Cloud dynamism on trust relationships

7.3 Challenges

7.4 Summary

7.5 Exercises



8 Establishing trust in Clouds

8.1 Introduction

8.2 Organization requirements

8.3 Framework requirements

8.4 Device properties

8.5 Framework architecture

8.6 Required software agents

8.7 Framework workflow

8.8 Discussion and analysis

8.9 Summary

8.10 Exercises



9 Clouds chains of trust

9.1 Introduction

9.2 Software agents revision

9.3 Roots of and chains of trust definition

9.4 Intra-layer chains of trust

9.5 Trust across layers

9.6 Summary

9.7 Exercises



10 Provenance in Clouds

10.1 Introduction

10.2 Motivating scenarios

10.3 Log records management and requirements

10.4 Framework domain architecture

10.5 Framework software agents

10.6 Framework workflow

10.7 Threat analysis

10.8 Discussion and future directions

10.9 Exercises



11 Insiders

11.1 Introduction

11.2 Insiders definition

11.3 Conceptual models

11.4 Summary

11.5 Exercises



Part Three Practical examples

12 Real life examples

12.1 Open Stack

12.2 Amazon web services

12.3 Component architecture

12.4 Prototype

12.5 Summary



13 Case Study

13.1 Scenario

13.2 Home healthcare architecture in the Cloud

13.3 Insiders analysis for home healthcare

13.4 Cloud threats

Available to OhioLINK libraries.

"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--



9144F636-2885-405B-8EC3-BC76273EF2BA OverDrive, Inc. http://www.overdrive.com

2014020190


Cloud computing.
Web services.
Computer security.


Electronic books.

QA76.585 / .A23 2014

004.6782 / A.I.C