Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Cloud management and security / Imad M. Abbadi.

By: Contributor(s): Material type: TextTextPublication details: New Delhi : Wiley, 2015.Description: xxii, 216 pages ; 24 cmContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
Uniform titles:
  • Wiley online library.
  • Wiley InterScience ebooks.
Subject(s): Genre/Form: Additional physical formats: Print version:: Cloud management and securityDDC classification:
  • 004.6782 23 A.I.C
LOC classification:
  • QA76.585 .A23 2014
Online resources:
Contents:
Preface References 1 Introduction 1.1 Overview 1.2 Cloud definition 1.3 Cloud evolution 1.4 Cloud services 1.5 Cloud deployment types 1.6 Main challenges of Clouds 1.7 Summary 1.8 Exercises Part One Cloud management 2 Cloud Structure 2.1 Introduction 2.2 Infrastructure components 2.3 Cloud Layers 2.4 Cloud relations 2.5 Cloud dynamics 2.6 Data types 2.7 Summary 2.8 Exercises 3 Fundamentals of Cloud management 3.1 Introduction 3.2 Clouds management services 3.3 Virtual control center 3.4 Prerequisite input-data for the management services 3.5 Management of user requirements 3.6 Summary 3.7 Exercises 4 Cloud properties 4.1 Introduction 4.2 Adaptability property 4.3 Resilience property 4.4 Scalability property 4.5 Availability property 4.6 Reliability property 4.7 Security and privacy property 4.8 Business model 4.9 Summary 4.10 Exercises 5 Automated management services 5.1 Introduction 5.2 Virtual layer self-managed services 5.3 Virtual services interdependency 5.4 Application layer self-managed services 5.5 Application services interdependency 5.6 Security and privacy by design 5.7 Multi-tier application deployment in the Cloud 5.8 Main challenges and requirements 5.9 Summary 5.10 Exercises Part Two Clouds security fundamentals 6 Background 6.1 Topics flow 6.2 Trusted Computing 6.3 Summary 7 Challenges for establishing trust in Clouds 7.1 Introduction 7.2 Effects of Cloud dynamism on trust relationships 7.3 Challenges 7.4 Summary 7.5 Exercises 8 Establishing trust in Clouds 8.1 Introduction 8.2 Organization requirements 8.3 Framework requirements 8.4 Device properties 8.5 Framework architecture 8.6 Required software agents 8.7 Framework workflow 8.8 Discussion and analysis 8.9 Summary 8.10 Exercises 9 Clouds chains of trust 9.1 Introduction 9.2 Software agents revision 9.3 Roots of and chains of trust definition 9.4 Intra-layer chains of trust 9.5 Trust across layers 9.6 Summary 9.7 Exercises 10 Provenance in Clouds 10.1 Introduction 10.2 Motivating scenarios 10.3 Log records management and requirements 10.4 Framework domain architecture 10.5 Framework software agents 10.6 Framework workflow 10.7 Threat analysis 10.8 Discussion and future directions 10.9 Exercises 11 Insiders 11.1 Introduction 11.2 Insiders definition 11.3 Conceptual models 11.4 Summary 11.5 Exercises Part Three Practical examples 12 Real life examples 12.1 Open Stack 12.2 Amazon web services 12.3 Component architecture 12.4 Prototype 12.5 Summary 13 Case Study 13.1 Scenario 13.2 Home healthcare architecture in the Cloud 13.3 Insiders analysis for home healthcare 13.4 Cloud threats
Summary: "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- Provided by publisher.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Main library A1 Computers & Information Technology ( Computer Science ) 004.6782 A.I.C (Browse shelf(Opens below)) Available 00014268

computer bookfair2016

Includes bibliographical references and index.

Preface

References



1 Introduction

1.1 Overview

1.2 Cloud definition

1.3 Cloud evolution

1.4 Cloud services

1.5 Cloud deployment types

1.6 Main challenges of Clouds

1.7 Summary

1.8 Exercises



Part One Cloud management

2 Cloud Structure

2.1 Introduction

2.2 Infrastructure components

2.3 Cloud Layers

2.4 Cloud relations

2.5 Cloud dynamics

2.6 Data types

2.7 Summary

2.8 Exercises



3 Fundamentals of Cloud management

3.1 Introduction

3.2 Clouds management services

3.3 Virtual control center

3.4 Prerequisite input-data for the management services

3.5 Management of user requirements

3.6 Summary

3.7 Exercises



4 Cloud properties

4.1 Introduction

4.2 Adaptability property

4.3 Resilience property

4.4 Scalability property

4.5 Availability property

4.6 Reliability property

4.7 Security and privacy property

4.8 Business model

4.9 Summary

4.10 Exercises



5 Automated management services

5.1 Introduction

5.2 Virtual layer self-managed services

5.3 Virtual services interdependency

5.4 Application layer self-managed services

5.5 Application services interdependency

5.6 Security and privacy by design

5.7 Multi-tier application deployment in the Cloud

5.8 Main challenges and requirements

5.9 Summary

5.10 Exercises



Part Two Clouds security fundamentals

6 Background

6.1 Topics flow

6.2 Trusted Computing

6.3 Summary



7 Challenges for establishing trust in Clouds

7.1 Introduction

7.2 Effects of Cloud dynamism on trust relationships

7.3 Challenges

7.4 Summary

7.5 Exercises



8 Establishing trust in Clouds

8.1 Introduction

8.2 Organization requirements

8.3 Framework requirements

8.4 Device properties

8.5 Framework architecture

8.6 Required software agents

8.7 Framework workflow

8.8 Discussion and analysis

8.9 Summary

8.10 Exercises



9 Clouds chains of trust

9.1 Introduction

9.2 Software agents revision

9.3 Roots of and chains of trust definition

9.4 Intra-layer chains of trust

9.5 Trust across layers

9.6 Summary

9.7 Exercises



10 Provenance in Clouds

10.1 Introduction

10.2 Motivating scenarios

10.3 Log records management and requirements

10.4 Framework domain architecture

10.5 Framework software agents

10.6 Framework workflow

10.7 Threat analysis

10.8 Discussion and future directions

10.9 Exercises



11 Insiders

11.1 Introduction

11.2 Insiders definition

11.3 Conceptual models

11.4 Summary

11.5 Exercises



Part Three Practical examples

12 Real life examples

12.1 Open Stack

12.2 Amazon web services

12.3 Component architecture

12.4 Prototype

12.5 Summary



13 Case Study

13.1 Scenario

13.2 Home healthcare architecture in the Cloud

13.3 Insiders analysis for home healthcare

13.4 Cloud threats

Available to OhioLINK libraries.

"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- Provided by publisher.

There are no comments on this title.

to post a comment.