Cloud management and security / Imad M. Abbadi.
Material type:
TextPublication details: New Delhi : Wiley, 2015.Description: xxii, 216 pages ; 24 cmContent type: - text
- computer
- online resource
- Wiley online library.
- Wiley InterScience ebooks.
- 004.6782 23 A.I.C
- QA76.585 .A23 2014
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library A1 | Computers & Information Technology ( Computer Science ) | 004.6782 A.I.C (Browse shelf(Opens below)) | Available | 00014268 |
computer bookfair2016
Includes bibliographical references and index.
Preface
References
1 Introduction
1.1 Overview
1.2 Cloud definition
1.3 Cloud evolution
1.4 Cloud services
1.5 Cloud deployment types
1.6 Main challenges of Clouds
1.7 Summary
1.8 Exercises
Part One Cloud management
2 Cloud Structure
2.1 Introduction
2.2 Infrastructure components
2.3 Cloud Layers
2.4 Cloud relations
2.5 Cloud dynamics
2.6 Data types
2.7 Summary
2.8 Exercises
3 Fundamentals of Cloud management
3.1 Introduction
3.2 Clouds management services
3.3 Virtual control center
3.4 Prerequisite input-data for the management services
3.5 Management of user requirements
3.6 Summary
3.7 Exercises
4 Cloud properties
4.1 Introduction
4.2 Adaptability property
4.3 Resilience property
4.4 Scalability property
4.5 Availability property
4.6 Reliability property
4.7 Security and privacy property
4.8 Business model
4.9 Summary
4.10 Exercises
5 Automated management services
5.1 Introduction
5.2 Virtual layer self-managed services
5.3 Virtual services interdependency
5.4 Application layer self-managed services
5.5 Application services interdependency
5.6 Security and privacy by design
5.7 Multi-tier application deployment in the Cloud
5.8 Main challenges and requirements
5.9 Summary
5.10 Exercises
Part Two Clouds security fundamentals
6 Background
6.1 Topics flow
6.2 Trusted Computing
6.3 Summary
7 Challenges for establishing trust in Clouds
7.1 Introduction
7.2 Effects of Cloud dynamism on trust relationships
7.3 Challenges
7.4 Summary
7.5 Exercises
8 Establishing trust in Clouds
8.1 Introduction
8.2 Organization requirements
8.3 Framework requirements
8.4 Device properties
8.5 Framework architecture
8.6 Required software agents
8.7 Framework workflow
8.8 Discussion and analysis
8.9 Summary
8.10 Exercises
9 Clouds chains of trust
9.1 Introduction
9.2 Software agents revision
9.3 Roots of and chains of trust definition
9.4 Intra-layer chains of trust
9.5 Trust across layers
9.6 Summary
9.7 Exercises
10 Provenance in Clouds
10.1 Introduction
10.2 Motivating scenarios
10.3 Log records management and requirements
10.4 Framework domain architecture
10.5 Framework software agents
10.6 Framework workflow
10.7 Threat analysis
10.8 Discussion and future directions
10.9 Exercises
11 Insiders
11.1 Introduction
11.2 Insiders definition
11.3 Conceptual models
11.4 Summary
11.5 Exercises
Part Three Practical examples
12 Real life examples
12.1 Open Stack
12.2 Amazon web services
12.3 Component architecture
12.4 Prototype
12.5 Summary
13 Case Study
13.1 Scenario
13.2 Home healthcare architecture in the Cloud
13.3 Insiders analysis for home healthcare
13.4 Cloud threats
Available to OhioLINK libraries.
"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- Provided by publisher.
There are no comments on this title.