Cloud computing Books
Manning Publications 100 Go Mistakes
Book Synopsis100 Go Mistakes: How to Avoid Them introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls. By reviewing dozens of interesting, readable examples and real-world case studies, you'll explore mistakes that even experienced Go programmers make. This book is focused on pure Go code, with standards you can apply to any kind of project. As you go, you'll navigate the tricky bits of handling JSON data and HTTP services, discover best practices for Go code organization, and learn how to use slices efficiently. Your code speed and quality will enjoy a huge boost when you improve your concurrency skills, deal with error management idiomatically, and increase the quality of your tests. About the Technology Go is simple to learn, yet hard to master. Even experienced Go developers may end up introducing bugs and inefficiencies into their code. This book accelerates your understanding of Go's quirks, helping you correct mistakes and dodge pitfalls on your path to Go mastery.Trade Review"This book is one any Golang developer will want on their bookshelf. Far from being dogmatic or prescriptive, it often provides multiple solutions to the reader, leaving some room for flexibility and individual taste." Thad Meyer "Goes beyond the basics with lots of good examples for when concepts are tough to grasp. As someone who's been coding Go for about 2 years, I learned new things." Matt Welke "This book felt catered to me. I'm not a developer by career path, however it provides a LOT of insight into what I should be thinking about as someone without any education or formal training in Software Development. Really, really nice." Francis J. Setash "This book not only points out common mistakes and anti-patterns, it provides solutions—a perfect combination for deeper learning." Kevin Liao "Read this, it'll give you years of experience of Go just learning from the book. Very valuable!" Keith Kim
£34.19
McGraw-Hill Education CCSP Certified Cloud Security Professional
Book SynopsisThis fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP examThoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge. The book offers clear explanations of every subject on the CCSP exam and features accurate practice questions and real-world examples. New, updated, or expanded coverage includes cloud data security, DevOps security, mobile computing, threat modeling paradigms, regulatory and legal frameworks, and best practices and standards.Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient p
£33.74
Manning Publications Continuous Delivery for Kubernetes
Book SynopsisTake the fast track in your journey to continuous delivery, with open source tools for Kubernetes and cloud applications. This book explores the tools and techniques you'll need to overcome common cloud native challenges. In Continuous Delivery for Kubernetes you will learn how to: Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Create and run pipelines using Tekton Plan and implement a multicloud strategy with Crossplane Implement risk-free and progressive upgrades with Knative Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance Continuous Delivery for Kubernetes lays out a toolbox of free, open source projects you can use to implement continuous delivery for Kubernetes-based applications in the cloud. Each chapter covers a different project, clearly demonstrating how it simplifies essential CD tasks like packaging, building pipelines, and multi-cloud deployment. This book shows developers and architects confidently identify common patterns in successful open source tools so they can pick the right options for their own platforms. about the technology Continuous delivery practices help your team quickly introduce, iterate on, and deploy new features so you can get software into production quickly. The tools in this book help facilitate continuous delivery practices by solving the technical and architectural challenges commonly found when adopting Kubernetes, automating essential dev and deployment tasks, and improving your team's collaboration. about the book Continuous Delivery for Kubernetes accelerates development of cloud-based systems with vibrant open source tools of the Kubernetes ecosystem. You'll use powerful open source projects like Helm, Tekton, Knative, and Crossplane to automate your projects from testing through delivery. Learn how to package services, build and deploy services to a Kubernetes cluster, and combine different tools to solve the complex challenges of CD in a cloud native environment. RETAIL SELLING POINTS Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance AUDIENCE For developers and software architects familiar with the basics of containers and Kubernetes. Trade Review'A great intro to best practices regarding continuous delivery in the cloud.' Rahul Jain 'The material is really excellent: the explanations are clear and the illustrative examples are practical and relevant.' Alain Lompo 'A great soup-to-nuts book for learning about CD for Kubernetes-native applications.' Kent SpillnerTable of Contentstable of contents detailed TOC READ IN LIVEBOOK 1CLOUD-NATIVE CONTINUOUS DELIVERY READ IN LIVEBOOK 2CLOUD-NATIVE APPLICATION CHALLENGES READ IN LIVEBOOK 3SERVICE AND ENVIRONMENT PIPELINES READ IN LIVEBOOK 4MULTI-CLOUD INFRASTRUCTURE READ IN LIVEBOOK 5RELEASE STRATEGIES READ IN LIVEBOOK 6EVENTS FOR CLOUD-NATIVE INTEGRATIONS READ IN LIVEBOOK 7FUNCTIONS FOR KUBERNETES 8 BUILDING A PLATFORM DESIGNED FOR CD 9 THE ROAD TO CONTINUOUS & PROGRESSIVE DELIVERY
£39.09
Manning Publications Data Pipelines with Apache Airflow
Book SynopsisPipelines can be challenging to manage, especially when your data has to flow through a collection of application components, servers, and cloud services. Airflow lets you schedule, restart, and backfill pipelines, and its easy-to-use UI and workflows with Python scripting has users praising its incredible flexibility. Data Pipelines with Apache Airflow takes you through best practices for creating pipelines for multiple tasks, including data lakes, cloud deployments, and data science. Data Pipelines with Apache Airflow teaches you the ins-and-outs of the Directed Acyclic Graphs (DAGs) that power Airflow, and how to write your own DAGs to meet the needs of your projects. With complete coverage of both foundational and lesser-known features, when you’re done you’ll be set to start using Airflow for seamless data pipeline development and management. Key Features Framework foundation and best practices Airflow's execution and dependency system Testing Airflow DAGs Running Airflow in production For data-savvy developers, DevOps and data engineers, and system administrators with intermediate Python skills. About the technology Data pipelines are used to extract, transform and load data to and from multiple sources, routing it wherever it’s needed -- whether that’s visualisation tools, business intelligence dashboards, or machine learning models. Airflow streamlines the whole process, giving you one tool for programmatically developing and monitoring batch data pipelines, and integrating all the pieces you use in your data stack. Bas Harenslak and Julian de Ruiter are data engineers with extensive experience using Airflow to develop pipelines for major companies including Heineken, Unilever, and Booking.com. Bas is a committer, and both Bas and Julian are active contributors to Apache Airflow.
£29.99
O'Reilly Media JavaScript The Definitive Guide
Book SynopsisFor nearly 25 years this best seller has been the go-to guide for JavaScript programmers. The seventh edition is fully updated to cover the 2020 version of JavaScript, and new chapters cover classes, modules, iterators, generators, Promises, async/await, and metaprogramming.
£47.99
Pearson Education (US) Exam Ref AZ305 Designing Microsoft Azure
Book SynopsisASHISH AGRAWAL is a qualified technocrat, offering over two decades of multifaceted experience as a Cloud Engineering and transformation leader, trusted advisor, developer, consultant, and Enterprise Cloud Architect. He drives a profound influence in the cloud technology landscape with provocative thought leadership and communicates his ideas with clarity and passion. He has deep, hands-on technical expertise, having spearheaded numerous successful cloud engagements for global Fortune 500 companies in advisory, presales, consulting, architecture, leadership, and delivery execution, and he has played technology leadership roles in large, complex, cross-functional, and multi-enterprise project teams. GURVINDER SINGH is a Microsoft Certified Azure Solutions Architect with 15 years of diversified IT experience working with the Microsoft Technology stack. In the past several years, Gurvinder has been guiding large enterprises in the transformation of legacy applications into cloudTable of ContentsCHAPTER 1 Design identity, governance, and monitoring solutions CHAPTER 2 Design data storage solutions CHAPTER 3 Design business continuity solutions CHAPTER 4 Design infrastructure solutions
£27.19
McGraw-Hill Education CCSK Certificate of Cloud Security Knowledge
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging CCSK exam from the Cloud Security AllianceThis highly effective self-study guide covers all domains of the challenging Certificate of Cloud Security Knowledge v4 exam. Written by a cloud security trainer and consultant in collaboration with the Cloud Security Alliance, CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide offers clear explanations, real-world examples, and practice questions that match the content and format of those on the actual exam. To aid in retention, each chapter includes exam tips that highlight key information, a review that serves as a quick recap of salient points, and practice questions tTable of ContentsChapter 1: Cloud Computing Concepts and ArchitecturesChapter 2: Governance and Enterprise Risk ManagementChapter 3: Legal Issues, Contracts, and Electronic DiscoveryChapter 4: Compliance and Audit ManagementChapter 5: Information GovernanceChapter 6: Management Plan E and Business ContinuityChapter 7: Infrastructure SecurityChapter 8: Virtualization and ContainersChapter 9: Incident ResponseChapter 10: Application SecurityChapter 11: Data Security and EncryptionChapter 12: Identity, Entitlement, and Access ManagementChapter 13: Security as a ServiceChapter 14: Related TechnologiesChapter 15: ENISA Cloud Computing: Benefits, Risks and Recommendations for Information SecurityAppendix A: Cloud Security LexiconAppendix B: Cloud Security Standards and CertificationsAppendix C: Sample Cloud Policy
£29.24
John Wiley & Sons Inc Architecting the Cloud
Book SynopsisAn expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements. Guides corporations through key cloud design considerations Discusses the pros and cons of each cloud service model Highlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and more Clearly defines the services cloud providers offer for each service model andTrade Reviewan invaluable guide to anyone looking to understand how to effectively deploy cloud technologies (RSA Conference, September 2014)Table of ContentsForeword xiii Preface xv Acknowledgments xix About the author xxi Chapter 1 Why Cloud, Why Now? 1 Evolution of Cloud Computing 3 Enter the Cloud 6 Start-Up Case Study: Instagram, from Zero to a Billion Overnight 8 Established Company Case Study: Netflix, Shifting from On-Premises to the Cloud 9 Government Case Study: NOAA, E-mail, and Collaboration in the Cloud 10 Not-for-Profit Case Study: Obama Campaign, Six-Month Shelf-Life with One Big Peak 10 Summary 11 Chapter 2 Cloud Service Models 13 Infrastructure as a Service 13 Platform as a Service 15 Software as a Service 17 Deployment Models 18 Summary 22 Chapter 3 Cloud Computing Worst Practices 23 Avoiding Failure When Moving to the Cloud 23 Migrating Applications to the Cloud 23 Misguided Expectations 27 Misinformed about Cloud Security 29 Selecting a Favorite Vendor, Not an Appropriate Vendor 31 Outages and Out-of-Business Scenarios 31 Underestimating the Impacts of Organizational Change 33 Skills Shortage 35 Misunderstanding Customer Requirements 36 Unexpected Costs 37 Summary 39 Chapter 4 It Starts with Architecture 41 The Importance of Why, Who, What, Where, When, and How 41 Start with the Business Architecture 43 Identify the Problem Statement (Why) 47 Evaluate User Characteristics (Who) 48 Identify Business and Technical Requirements (What) 48 Visualize the Service Consumer Experience (Where) 49 Identify the Project Constraints (When and with What) 51 Understand Current State Constraints (How) 52 Summary 54 Chapter 5 Choosing the Right Cloud Service Model 55 Considerations when Choosing a Cloud Service Model 56 When to Use SaaS 59 When to Use PaaS 62 When to Use IaaS 65 Common Cloud Use Cases 68 Summary 69 Chapter 6 The Key to the Cloud: RESTful Services 71 Why REST? 72 The Challenges of Migrating Legacy Systems to the Cloud 74 Summary 75 Chapter 7 Auditing in the Cloud 77 Data and Cloud Security 78 Auditing Cloud Applications 78 Regulations in the Cloud 80 Audit Design Strategies 83 Summary 85 Chapter 8 Data Considerations in the Cloud 87 Data Characteristics 87 Multitenant or Single Tenant 92 Choosing Data Store Types 95 Summary 98 Chapter 9 Security Design in the Cloud 99 The Truth about Data in the Cloud 100 How Much Security Is Required 101 Responsibilities for Each Cloud Service Model 104 Security Strategies 108 Areas of Focus 110 Summary 118 Chapter 10 Creating a Centralized Logging Strategy 119 Log File Uses 119 Logging Requirements 120 Summary 124 Chapter 11 SLA Management 127 Factors That Impact SLAs 127 Defining SLAs 130 Managing Vendor SLAs 132 Summary 135 Chapter 12 Monitoring Strategies 137 Proactive vs. Reactive Monitoring 137 What Needs to Be Monitored? 138 Monitoring Strategies by Category 139 Monitoring by Cloud Service Level 145 Summary 147 Chapter 13 Disaster Recovery Planning 149 What Is the Cost of Downtime? 149 Disaster Recovery Strategies for IaaS 151 Recovering from a Disaster in the Primary Data Center 152 Disaster Recovery Strategies for PaaS 157 Disaster Recovery Strategies for SaaS 159 Disaster Recovery Hybrid Clouds 160 Summary 162Chapter 14 Leveraging a DevOps Culture to Deliver Software Faster and More Reliably 163 Developing the DevOps Mind-Set 163 Automate Infrastructure 165 Automate Deployments 166 Design Feature Flags 167 Measure, Monitor, and Experiment 167 Continuous Integration and Continuous Delivery 168 Summary 170 Chapter 15 Assessing the Organizational Impact of the Cloud Model 171 Enterprise Model vs. Elastic Cloud Model 172 IT Impact 173 Business Impacts 174 Organization Change Planning 178 Change in the Real World 180 Summary 181 Chapter 16 Final Thoughts 183 The Cloud Is Evolving Rapidly 183 Cloud Culture 185 New Business Models 186 PaaS Is the Game Changer 187 Summary 190 Index 193
£35.62
MIT Press Ltd Cloud Computing The MIT Press Essential Knowledge
Book SynopsisWhy cloud computing represents a paradigm shift for business, and how business users can best take advantage of cloud services.Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling point. This book, however, explains the cloud from the user's viewpoint—the business user's in particular. Nayan Ruparelia explains what the cloud is, when to use it (and when not to), how to select a cloud service, how to integrate it with other technologies, and what the best practices are for using cloud computing. Cutting through the hype, Ruparelia cites the simple and basic definition of cloud computing from the National Institute of Science and Technology: a model enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Thus with cloud computing, businesses can harness information t
£15.19
O'Reilly Media Heroku
Book SynopsisTake full advantage of Heroku's cloud-based hosting services. This guide takes you through the inner workings of this PaaS platform and delivers practical advice for architecting your application to work as efficiently as possible.
£7.59
Manning Publications Learn Azure in a Month of Lunches
Book SynopsisIn this fully updated and new edition, you’ll get hands-on practice with the basics, including setting up cloud-based virtual machines, deploying web servers, and using hosted data stores. As you work through the book’s 21 carefully planned lessons, you’ll explore big-picture concerns like security, scaling, and automation. Learn Azure in a Month of Lunches, Second Edition teaches you the most important skills you’ll need to write, deploy, and run cloud-based applications in Azure. Key Features · Understand Azure beyond point-and-click processes · Getting started, from your first login · Writing and deploying web servers · Securing your applications and dana · Automating your environment Readers should be able to write and deploy simple web or client/server applications. About the technology With hundreds of features and prebuilt services, the Microsoft Azure cloud platform is vast and powerful. To get started, you need a trustworthy guide. In this hands-on book, Microsoft engineer and Azure trainer Iain Foulds focuses on the core skills you need to create and maintain cloud-based applications. Iain Foulds is an engineer and senior content developer with Microsoft.
£35.99
Pearson Education (US) Cisco Cloud Infrastructure
Book SynopsisAvinash Shukla (CCIE No. 28418), Senior Leader in Cisco's US Customer Experience (CX) Organization, has 14 years of experience in Cisco CX roles spanning Professional and Technical Services, and extensive expertise in collaboration and data center technologies. He now leads a team of engineers working on Cisco Data Center Technology (Cisco Unified Computing Systems, Hyperconverged Infrastructure, Virtualization, and data center automation). He holds a B.Tech in ECE from IIIT, Hyderabad and has won numerous Cisco awards for customer focus, and has delivered many technical trainings for Cisco partners and customers. Jalpa Patel (CCIE No. 42465) is a multidisciplinary technologist and a passionate leader with a strong track record of successful engineering executions and game-changing business achievements defining, building, and growing new products. Her domain knowledge of Data Center hardware infrastructure is focused on ComputeTable of Contents Introduction xxiii Part 1 Cisco Data Center Networking and Infrastructure Chapter 1 Cisco Data Center Orchestration 1 IT Challenges and Data Center Solutions 2 Cisco Nexus Dashboard 4 Cisco Nexus Dashboard Orchestrator 14 Cisco Nexus Dashboard Fabric Controller 25 Third-party Applications and Cloud-based Services 34 Summary 39 References/Additional Reading 40 Chapter 2 Cisco Data Center Analytics and Insights 41 Cisco Nexus Dashboard Insights 41 Cisco Nexus Dashboard Data Broker 68 Cisco Meraki MX 74 Summary 79 References/Additional Reading 79 Chapter 3 Cisco Data Center Solutions for Hybrid Cloud 81 Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) 82 Cisco UCS Director 92 Cisco Workload Optimization Manager 103 Cisco Hyperflex -- Intersight 116 Summary 127 References/Additional Reading 127 Part 2 Cisco Applications and Workload Management Chapter 4 Application, Analytics, and Workload Performance Management with AppDynamics 129 What Is AppDynamics? 129 AppDynamics Concepts 130 Deployment Planning Guide 135 Application Monitoring 142 Integration with Other AppDynamics Modules 146 Application Security Monitoring 148 End User Monitoring 154 Database Visibility 169 Analytics 178 Monitoring Cloud Applications 180 Cloud Monitoring with AppDynamics Cloud 196 Cloud Infrastructure Monitoring 197 Summary 198 References/Additional Reading 199 Chapter 5 Management 201 IT Challenges and Workload Management Solutions 202 Cisco Intersight Workload Optimizer 204 Understanding Intersight Workload Optimizer Supply Chain 212 Cisco Container Platform 215 Cisco Intersight Kubernetes Service 228 Summary 238 References/Additional Reading 238 Chapter 6 Cisco Cloud Webex Application 239 Cisco Webex Features 239 Cisco Webex Cloud Service Architecture 268 Summary 286 References/Additional Reading 286 Chapter 7 Internet of Things (IoT) 287 How Do OT and IT Differ? 288 Cisco Kinetic Platform 289 Introduction to Cisco IoT 297 Edge Device Manager 298 Edge Intelligence 305 Licensing 311 Summary 311 Part 3 Cisco Cloud Security Chapter 8 Cisco Cloud Security 313 Shadow IT Challenge 313 Cisco Cloudlock 314 Cisco Umbrella 328 Cisco Secure Cloud Analytics 337 Cisco Duo Security 348 Summary 360 9780137690121, TOC, 1/25/2023
£42.74
Springer Verlag, Singapore Cloud Computing Technology
Book SynopsisThis open access book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, big data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence.Table of ContentsChapter 1 Introduction to Cloud Computing 1 1.1 Ubiquitous Cloud Computing 1 1.2 The properties of Cloud Computing 3 1.2.1 On-demand self-service 3 1.2.2 Extensive network access 4 1.2.3 Resource Pooling 4 1.2.4 Fast and elastic scaling 4 1.2.5 Measurable services 5 1.3 Definition of Cloud Computing 6 1.4 The emergence and development of Cloud Coputing 9 1.4.1 The history of the network and the Internet 9 1.4.2 The history of computing models 11 1.4.3 The driving force of cloud computing 16 1.4.4 Development of Cloud Computing 18 1.5 云计算的优势 18 1.6 Classification of Cloud Computing 19 1.6.1 Classification by operating model 19 1.6.2 Classification by service model 21 1.7 Cloud enabling technology 23 1.7.1 Broadband network and Internet architecture 23 1.7.2 Data Center Technology 25 1.7.3 Virtualization Technology 25 1.7.4 Web Technology 26 1.7.5 Multi-tenant technology 28 1.7.6 Service Technology 28 1.8 Understanding cloud computing from various perspectives 30 1.8.1 The ternary epistemology of cloud computing 30 1.8.2 Open Source Methodology of Cloud Computing 34 1.9 Exercises 37 Chapter 2 Cloud Computing System 39 2.1 Cloud infrastructure mechanism 39 2.1.1 Logical network boundary 39 2.1.2 Virtual Server 40 2.1.3 Cloud storage devices 41 2.1.4 Cloud usage monitoring 44 2.1.5 Resource Copy 46 2.2 Cloud management mechanism 46 2.2.1 Remote management system 47 2.2.2 Resource Management System 48 2.2.3 SLA Management System 49 2.2.4 Billing Management System 49 2.3 Cloud security mechanism 50 2.3.1 Encryption 50 2.3.2 Hashing 51 2.3.3 Digital Signature 52 2.3.4 Public Key Infrastructure 53 2.3.5 Identity and access management 54 2.3.6 Single sign-on 54 2.3.7 Cloud-based security groups 55 2.3.8 Hardened Virtual Server Image 56 2.4 Basic Cloud Architecture 57 2.4.1 Load Distribution Architecture 57 2.4.2 Resource Pool Architecture 58 2.4.3 Dynamic Scalable Architecture 58 2.4.4 Flexible resource capacity architecture 59 2.4.5 Service load balancing architecture 60 2.4.6 Cloud Burst Architecture 61 2.4.7 Elastic Disk Supply Architecture 61 2.4.8 Redundant Storage Architecture 62 2.5 Exercises 63 Chapter 3 Virtualization Technology 65 3.1 Introduction to Virtualization Technology 65 3.1.1 Definition of virtualization 65 3.1.2 Development of virtualization technology 66 3.1.3 Advantages of virtualization technology 67 3.1.4 Common types of virtualization technology 68 3.2 Basic knowledge of server virtualization 69 3.2.1 System virtualization 69 3.2.2 Server virtualization 70 3.2.3 Typical Implementation 70 3.2.4 Full virtualization 71 3.2.5 Paravirtualization 72 3.2.6 Mainstream server virtualization technology 73 3.3 Supporting technology of server virtualization 73 3.3.1 CPU virtualization 73 3.3.2 Memory virtualization 75 3.3.3 Device and I/O virtualization 76 3.3.4 Storage virtualization 78 3.3.5 Network virtualization 78 3.3.6 Desktop virtualization 79 3.4 Main functions of virtual machine 80 3.4.1 Virtual machine snapshot 80 3.4.2 Rapid deployment and cloning of virtual machines 81 3.4.3 Virtual machine backup 82 3.4.4 Virtualization cluster 82 3.4.5 Hot Adding Virtual Machine Resources 83 3.4.6 NUMA 84 3.5 KVM 84 3.5.1 Introduction to KVM 84 3.5.2 Virtualization Technology of KVM 85 3.6 FusionCompute 86 3.6.1 Introduction to FusionCompute 86 3.6.2 Computing Virtualization of FusionCompute 88 3.6.3 FusionCompute storage virtualization 91 3.6.4 FusionCompute network virtualization 92 3.7 Desktop Cloud 93 3.7.1 Overview of Desktop Cloud 93 3.7.2 Desktop Cloud Architecture and Key Technologies 93 3.7.3 Typical Application Cases of Desktop Cloud 94 3.7.4 Introduction to FusionAccess 95 3.8 Exercises 96 Chapter 4 Network Basics in Cloud Computing 97 4.1 Computer network overview 97 4.1.1 Basic concepts of computer networks 97 4.1.2 The formation and development of computer networks 98 4.1.3 Definition and function of computer network 100 4.1.4 The composition of a computer network 100 4.1.5 Classification of computer networks 101 4.1.6 Computer network topology 103 4.2 The basic principles of computer networks 104 4.2.1 Network layering and encapsulation 105 4.2.2 Physical layer 106 4.2.3 Data link layer 106 4.2.4 Network layer 107 4.2.5 Transport layer 107 4.2.6 Application layer 108 4.3 Network interconnection equipment 108 4.3.1 Repeaters and hubs 108 4.3.2 Bridges and switches 109 4.3.3 Router 110 4.4 Network virtualization 112 4.4.1 Overview of Network Virtualization 112 4.4.2 Traditional network virtualization 112 4.4.3 Virtual network based on virtual switch 116 4.4.4 Network Features of Huawei Virtualization Products 121 4.5 Software Defined Network 124 4.5.1 Introduction to SDN 124 4.5.2 A Brief History of SDN Development 125 4.5.3 SDN Architecture 127 4.5.4 Key SDN Technologies 128 4.5.5 Advantages of SDN 129 4.6 Exercises 130 Chapter 5 Storage Basics in Cloud Computing 132 5.1 Basic knowledge of storage 132 5.1.1 Storage development and technological evolution 132 5.1.2 Cutting-edge storage technologies and development trends 135 5.1.3 Common storage products and solutions 136 5.1.4 Data Security Technology of Cloud Storage 137 5.2 Basic storage unit 138 5.2.1 Mechanical hard disk 138 5.2.2 Solid State Drive 140 5.3 Network storage 142 5.3.1 DAS 142 5.3.2 SAN 143 5.3.3 NAS 146 5.4 Storage Reliability Technology 149 5.4.1 Traditional RAID Technology 149 5.4.2 RAID 2.0 + Technology 151 5.5 Storage virtualization 155 5.5.1 Virtualization of I/O Paths 155 5.5.2 Block-level and file-level storage virtualization 157 5.5.3 Host-based storage virtualization 161 5.5.4 Storage virtualization based on storage devices 161 5.5.5 Network-based storage virtualization 161 5.5.6 Storage virtualization products and applications 162 5.6 Distributed Storage 163 5.6.1 Overview of Cloud Storage 163 5.6.2 HDFS 164 5.6.3 Peer Storage System 166 5.7 Exercises 168 Chapter 6 OpenStack 169 6.1 Overview of OpenStack 169 6.1.1 OpenStack Architecture 169 6.1.2 OpenStack core components 170 6.1.3 Logical relationship between OpenStack components 171 6.2 OpenStack operation interface management 172 6.2.1 Introduction to OpenStack Operation Interface 172 6.2.2 The architecture and functions of the OpenStack operation interface 172 6.3 OpenStack certification management 173 6.3.1 Introduction to OpenStack Authentication Service 173 6.3.2 Principles of OpenStack Authentication Service 175 6.4 OpenStack image management 176 6.4.1 Introduction to OpenStack Image Service 176 6.4.2 Principles of OpenStack Image Service 177 6.5 OpenStack Computing Management 177 6.5.1 Introduction to OpenStack Computing Service 177 6.5.2 Principles of OpenStack Computing Services 178 6.6 OpenStack storage management 180 6.6.1 Introduction to OpenStack Storage Service 180 6.6.2 Principles of OpenStack Storage Service 181 6.7 OpenStack Network Management 184 6.7.1 Basics of Linux Network Virtualization 184 6.7.2 Introduction and Architecture of OpenStack Network Services 187 6.7.3 OpenStack network service principle and process 188 6.7.4 Analysis of typical scenarios of OpenStack network services 189 6.8 OpenStack Orchestration Management 190 6.8.1 Introduction to OpenStack Orchestration Service 190 6.8.2 OpenStack Orchestration Service Architecture 191 6.8.3 Principles of OpenStack Orchestration Service 192 6.8.4 OpenStack orchestration service and configuration management tool integration 192 6.9 OpenStack fault management 193 6.9.1 OpenStack troubleshooting 194 6.9.2 OpenStack troubleshooting tools 195 6.9.3 OpenStack troubleshooting cases 196 6.9.4 OpenStack troubleshooting related items 198 6.10 Exercises 199 Chapter 7 Container Technology 201 7.1 Overview of Container Technology 201 7.1.1 Introduction to Container Technology 201 7.1.2 Container Mirroring 7.1.3 Container Network 210 7.1.4 Container storage 213 7.1.5 The underlying implementation technology of the container 216 7.2 Overview of Kubernetes 217 7.2.1 Introduction to Kubernetes 217 7.2.2 Kubernetes Management Objects 219 7.2.3 Kubernetes Service 7.2.4 Kubernetes Network 223 7.2.5 Kubernetes storage 226 7.2.6 Kubernetes Service Quality 229 7.2.7 Kubernetes Resource Management 231 7.3 Exercises 234 Chapter 8 Cloud Computing Development Trends 236 8.1 Cloud Computing Development Trend 236 8.1.1 The development and trend of cloud computing in China 236 8.1.2 The development and trend of cloud computing abroad 237 8.1.3 Problems to be solved and prospects for the future development of cloud computing 238 8.2 Other fields related to cloud computing 239 8.2.1 The Internet of Things 239 8.2.2 Big Data 241 8.2.3 Artificial Intelligence 243 8.2.4 5G 244 8.3 Introduction to other emerging technologies 245 8.3.1 Edge computing and fog computing 245 8.3.2 Microservices 247 8.3.3 Serverless Computing 249 8.4 Exercises 251 References 252
£40.49
O'Reilly Media Managing Cloud Native Data on Kubernetes
Book SynopsisUsing Kubernetes as your platform, you'll learn open source technologies that are designed and built for the cloud. Authors Jeff Carpenter and Patrick McFadin provide case studies to help you explore new use cases and avoid the pitfalls others have faced.
£47.99
John Wiley & Sons Inc ISC2 CCSP Certified Cloud Security Professional
Book Synopsis
£56.25
Manning Publications Pipeline as Code: Continuous Delivery with
Book Synopsis"Don't setup the build pipeline with clicks, read this bookinstead and thank me later!" - Michal Rutka Learn how to think about your development pipeline as amission-critical application, with techniques for implementing code-driven infrastructure and CI/CD systems using Jenkins, Docker, Terraform, andcloud-native services. In Pipeline as Code, you will master: · Building and deploying a Jenkins cluster from scratch · Writing pipeline as code for cloud native applications · Automating the deployment of Dockerized and Serverless applications · Containerizing applications with Docker and Kubernetes · Deploying Jenkins on AWS, GCP and Azure · Managing, securing and monitoring a Jenkins cluster in production · Key principles for a successful DevOps culture Pipeline as Code is a practical guide to automating your development pipeline in a cloud-native, service-driven world. You'll use the latest infrastructure-as-code tools like Packer and Terraform to develop reliable CI/CD pipelines for numerous cloud-native applications. Follow thisbook's insightful best practices, and you'll soon be delivering software that's quicker to market, faster to deploy, and with less last-minute production bugs. about the technology A good deployment pipeline is the backbone of successful DevOps. Using tools such as Jenkins, CI/CD can seamlessly manage the code of multiple developers, with early accuracy checks and error spotting thanks to automated testing. about the book Pipeline as Code teaches you to build your very first CI/CDpipeline with new automation technologies, modern cloud-hosted services, andclassic tools like Jenkins. It's filled with techniques that author and Jenkins contributor Mohamed Labouardy has developed maintaining thousands of production services. Each chapter includes relevant hands-on examples, including writing a CI/CD workflow for serverless AWS Lambda-based applications, and deploying a centralized logging platform based on the ELK stack. You'll explore cutting-edge methods of running Jenkins inside Kubernetes, and packaging Kubernetes applications within CI/CD pipelines. By the time you're done, you'llbe able to deploy a self-healing Jenkins cluster on cloud and take advantage ofyour new pipeline with essential DevOps practices. about the reader For developers familiar with Jenkins and Docker. Examples in Go. about the author Mohamed Labouardy is the CTO and co-founder of Crew.work, and aDevSecOps evangelist. He is the founder of Komiser.io, an author, open-source contributor, and regular conference speaker. Trade Review“Don't setup the build pipeline with clicks, read this book instead and thank me later!” Michal Rutka “If you're interested in learning how to set up your own CI/CD infrastructure, check this book out.” Alexander Koutmos “If you need to make a comprehensive understanding of Jenkins and the pieces it uses, this is a really good resource.” Miguel Montalvo “The book is really useful and holds a lot of good insights tocloud native projects and it will be really useful for AWS users.” MicheleAdduci “If you want to learn the processes of CI/CD from the foundational level this is the book for you, even if you're new to the topic!” Ryan Huber “Read Labouardy's masterpiece if you want to learn how to build modern and efficient pipelines based on Jenkins, Kubernetes and Terraform. Youwill learn as well how to monitor these pipelines using the options that suits your case the most: a must!” Alain Lompo “An excellent in-depth resource on CI/CD with Jenkins.” Tahir Awan “A very useful resource not only in setting up and using Jenkinsfor CI/CD, but also for understanding the importance of Packer, Terraform,Docker and Kubernetes.” Kosmas Chatzimichalis
£43.19
Manning Publications Cloud Native Spring in Action: With Spring Boot
Book SynopsisTo really benefit from the reliability and scalability you get with cloud platforms, your applications need to be designed for that environment. Cloud Native Spring in Action is a practical guide for planning, designing, and building your first cloud native apps using the powerful, industry-standard Spring framework Cloud Native Spring in Action teaches you effective Spring and Kubernetes cloud development techniques that you can immediately apply to enterprise-grade applications. As you develop an online bookshop, you'll learn how to build and test a cloud native app with Spring, containerize it with Docker, and deploy it to the public cloud with Kubernetes. Including coverage of security, continuous delivery, and configuration, this hands-on guide is the perfect primer for navigating the increasingly complex cloud landscape. About the TechnologyModern applications need scalability, resilience, reliability, and zero-downtime. For most large systems, that means you'll take advantage of cloud-based tools and services. For Java developers, Spring helps effortlessly build cloud native, production-ready applications. Combined with Kubernetes, the Spring ecosystem offers numerous built-in features to help out developers migrating or building new cloud native projects efficiently.Trade Review"An excellent practical guide to learn and develop Cloud Native apps using Spring. A must-have for Spring professional." Harinath Kuntamukkala "Curious about writing production grade Cloud Native applications using Spring and don't know where to start? Read this book and thank me later!" Yogesh Shetty "The definitive guide to developing cloud native applications using Spring." Nathan B Crocker "Filled to the brim with real world examples and ready to use code." Mladen Knežić "This book is perfect to understand how to build cloud native architecture using Java and Spring. All the chapters are useful and their content can be applied in real-world scenarios." Gilberto Taccari
£40.85
Pearson Education Securing Enterprise Networks with Cisco Meraki
Book SynopsisRyan Chaney, the lead author on this book, started his Cisco journey in his early 20s, completing his first CCIE (R+S) at the age of 25, before completing his second CCIE (Security) just 2 years later. Before joining Cisco, he worked in a variety of networking roles across the world, including time as a network architect for Visa in London. Ryan spent the first 10 years of his 15 years at Cisco as a systems engineer, educating customers, designing, and building IT solutions. His first experience with Meraki came while volunteering at the Royal Far West Centre for Country Kids, where he designed and built the network for their new headquarters in Manly, Sydney. At the time, no books had been published on Meraki. This experience and wanting to share his learnings with fellow network engineers, like you, became the inspiration for this book. Ryan lives in Bondi Beach, Australia. Simerjit Singh, the contributing author on this book, is a seasoned
£43.19
John Wiley & Sons Inc Cloud Computing Solutions
Book SynopsisCLOUD COMPUTING SOLUTIONS The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems. This book discusses the evolution of cloud computing through grid computing and cluster computing. It will help researchers and practitioners to understand grid and distributed computing cloud infrastructure, virtual machines, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art cloud computing countermeasures. This book covers the spectrum of cloud computing-related technologies and the wide-ranging contents will differentiate this book from others. The topics treated in the book include: The evolution of cloud computing from grid computing, cluster computing, and distributed systems; Table of ContentsList of Figures xvii List of Tables xix Foreword xxi Preface xxiii Acknowledgments xxv Acronyms xxvii Part I: Cloud Computing Architecture 1 1 Basics of Cloud Computing 3Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 1.1 Evolution of Cloud Computing 4 1.2 Cluster Computing 7 1.2.1 The Architecture of Cluster Computing Environment 7 1.2.2 Components of Computer Cluster 8 1.3 Grid Computing 9 1.3.1 Grid-Related Technologies 10 1.3.2 Levels of Deployment 11 1.3.3 Architecture of Grid Computing Environment 13 1.4 Mobile Computing 16 1.4.1 Characteristics of Mobile Computing 17 1.4.2 Characteristics of Mobile Networks 17 1.5 Summary 18 Exercises 18 References 19 2 Introduction to Cloud Computing 21Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 2.1 Definition of Cloud Computing 22 2.2 Characteristics of Cloud 22 2.2.1 Elasticity and Scalability 23 2.2.2 Metered and Billing of Service 23 2.2.3 Self-Service Allocation of Resources 23 2.2.4 Application Programming Interface (APIs) 24 2.2.5 Efficiency Measurement Service 24 2.2.6 Device and Location Interdependency 24 2.2.7 Customization 24 2.2.8 Security 25 2.3 Cloud Computing Environment 25 2.3.1 Access to Supporting Business Agility 25 2.3.2 Minimizing Investment Expenditures 25 2.3.3 Public Cloud Computing Environment 25 2.3.4 Private Cloud Computing Environment 26 2.3.5 Hybrid Cloud Computing Environment 27 2.3.6 Community Cloud Computing Environment 27 2.4 Cloud Services 28 2.4.1 Resources as a Service (RaaS) 28 2.4.2 Infrastructure as a Service (IaaS) 28 2.4.3 Platform as a Service (PaaS) 29 2.4.4 Software as a Service (SaaS) 30 2.4.5 Network as a Service (NaaS) 31 2.4.6 Desktop as a Service (DaaS/VDI) 32 2.4.7 Recovery as a Service (DRaaS) 32 2.5 Security Paradigms and Issues of Cloud Computing 32 2.6 Major Cloud Service Providers 33 2.6.1 IaaS CSPs 33 2.6.2 PaaS CSPs 35 2.6.3 SaaS CSPs 35 2.7 Summary 35 Exercises 36 References 37 3 Architectural Framework for Cloud Computing 39Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 3.1 Challenges of Cloud Computing Environment 40 3.2 Architectural Framework for Cloud Computing 41 3.2.1 Service-Oriented Architecture (SOA) 41 3.2.2 SOA Characterization 42 3.2.3 Life Cycle of Services in SOA 43 3.2.4 Integrating SOA and the Cloud 45 3.2.5 Cloud Architecture 46 3.3 Architectural Workflow and Co-ordination of Multiple Activities 49 3.3.1 Characteristics of Workflow 50 3.3.2 Need for Workflow 50 3.4 Examples of Workflow Tools 52 3.5 Summary 53 Exercises 53 References 54 4 Virtualization Environment in Cloud Computing 57Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 4.1 Introduction 58 4.1.1 Need of Virtualization in Cloud Computing Environment 58 4.1.2 Virtualization versus Traditional Approach 58 4.2 Virtualization and Virtual Machine 59 4.2.1 Advantages of Virtualization Technique in Cloud Computing Environment 60 4.2.2 Category of Virtual Machine 61 4.3 Virtualization Model for Cloud Computing 64 4.3.1 Distributed Resources of Physical Hosts 65 4.3.2 Hypervisor Monitoring Environment (HME) 65 4.3.3 Platform Service 66 4.3.4 Software Service 66 4.3.5 Broker Service 67 4.3.6 Business Service 67 4.4 Categorization of Guest OS Virtualization Techniques 68 4.4.1 Full Virtualization 68 4.4.2 Paravirtualization 69 4.4.3 Hardware-Assisted Virtualization 70 4.5 Mapping Technique of Virtual Machine to Physical Machine in a Private Cloud 71 4.6 Drawbacks of Virtualization 72 4.7 Summary 73 Exercises 74 References 75 5 Classification of Virtualization Environment 77Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 5.1 Introduction 78 5.2 Classification 78 5.2.1 Scheduling-Based Environment 79 5.2.2 Load Distribution-Based Environment 80 5.2.3 Energy-Aware-Based Environment 81 5.2.4 Operational-Based Environment 82 5.2.5 Distribution Pattern-Based Environment 85 5.2.6 Transaction-Based Environment 86 5.3 Summary 87 Exercises 87 References 88 Part II: Cloud Computing Data Storage 91 6 An Approach to Live Migration of Virtual Machines in Cloud Computing Environment 93Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 6.1 Introduction 94 6.2 Need of Live Migration of Virtual Machine 94 6.3 Advantages of Live Migration 94 6.4 A Design Approach to Live Migration 95 6.4.1 Live Migration Process 97 6.5 Security Issues 99 6.5.1 Possible Attacks 99 6.5.2 Solutions 100 6.6 Summary 100 Exercises 100 References 101 7 Reliability Issues in Cloud Computing Environment 103Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 7.1 Introduction 104 7.1.1 Research Problem Statement 105 7.1.2 Research Aim 105 7.1.3 Research Question 105 7.2 Literature Review 106 7.2.1 Cloud Service Models 107 7.2.2 Elements of Reliable Cloud Computing 108 7.2.3 Cloud Computing Gaps and Concerns 109 7.2.4 Trends in Cloud Computing 110 7.3 Reliability Issues in Cloud Computing Research 111 7.3.1 Research Methodology 111 7.3.2 Research Strategy 111 7.3.3 Data Collection 112 7.3.4 Sampling 112 7.3.5 Data Analysis and Findings 112 7.4 Findings 114 7.4.1 Lack of Effort to Address Reliability and Availability Issues 114 7.4.2 Performance Issues 115 7.4.3 Privacy Issues 115 7.5 Summary 115 Exercises 116 References 116 8 Cloud Database 123Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 8.1 Introduction 124 8.2 Non-Relational Data Models 124 8.2.1 Transactions in Cloud Databases 125 8.2.2 Advantages of Cloud Database 125 8.3 Heterogeneous Databases in DaaS 126 8.3.1 Relational and Non-Relational Database 126 8.3.2 Centralized and Distributed Database 126 8.3.3 Structured and Unstructured Database 127 8.3.4 Infrastructure-Based and Infrastructureless Databases 127 8.3.5 SQL-Based and NoSQL-Based Databases 128 8.4 Study of a Document-Oriented Cloud Database - MongoDB 129 8.4.1 Data Model 129 8.4.2 Replication 129 8.4.3 Sharding 130 8.4.4 Architecture 131 8.4.5 Consistency 132 8.4.6 Failure Handling 132 8.5 CAP Theorem for Cloud Database Transaction 132 8.6 Issues in Live Migration of Databases in Cloud 133 8.7 Cloud Database Classification Based on Transaction Processing 134 8.7.1 ACID-Based Cloud Database 134 8.7.2 NoACID-Based Cloud Database 135 8.8 Commercially Available Cloud Database Platform 136 8.8.1 Amazon Web Services 137 8.8.2 Microsoft Windows Azure 138 8.8.3 Google App Engine 138 8.9 Summary 138 Exercises 138 References 140 9 Cloud-Based Data Storage 143Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 9.1 Relevant Hadoop Tools 144 9.2 Hadoop Distributed File System (HDFS) 145 9.2.1 HDFS Architecture 145 9.2.2 Data Read Process in HDFS 146 9.2.3 Data Write Process in HDFS 147 9.2.4 Authority Management of HDFS 148 9.2.5 Limitations of HDFS 148 9.3 Data Mining Challenges with Big Data 149 9.4 MapReduce 151 9.4.1 MapReduce Architecture 151 9.4.2 MapReduce Procedure 152 9.4.3 Limitations of MapReduce 153 9.5 Next Generation of MapReduce: YARN 154 9.5.1 YARN Compared to MapReduce 1.0 (MRv1) 155 9.5.2 YARN and MapReduce 2.0 (MRv2) 156 9.5.3 YARN Architecture 156 9.5.4 Advantages of YARN 159 9.6 Classification of Data Mining Systems 160 9.6.1 Classification According to Kind of Databases Mined 160 9.6.2 Classification According to Kind of Knowledge Mined 160 9.6.3 Classification According to Kind of Techniques Utilized 161 9.6.4 Classification According to the Applications Adapted 161 9.7 Summary 162 Exercises 162 References 163 10 Auditing Concept in Cloud Computing 165Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 10.1 Introduction 166 10.2 Data Security in Cloud Computing Environment 166 10.2.1 Characteristics of a Secure Cloud Computing Environment 166 10.2.2 Need for Auditing in Cloud Computing Environment 167 10.2.3 Auditing Background Within Third-Party Service Provider 167 10.3 Cloud Auditing Outsourcing Life Cycle Phases 167 10.4 Auditing Classification 168 10.5 Auditing Service 169 10.5.1 How Third-Party Service Provider is Enabling Auditing Service 171 10.5.2 Auditing Process Analysis 171 10.5.3 Privacy and Integrity 174 10.5.4 Cloud-Auditing Architecture Analysis 176 10.6 Summary 177 Exercises 178 References 178 Part III: Cloud Computing Implementation, Security and Applications 181 11 Security Paradigms in Cloud Computing 183Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 11.1 Security Paradigms and Issues 184 11.2 Cloud Security Challenges 185 11.3 Cloud Economics 187 11.4 Security of Big Data in Cloud 187 11.4.1 The Biggest Risk: Data Breach 188 11.4.2 Data Loss 188 11.4.3 Account or Service Traffic Hijacking 189 11.4.4 Insecure Interfaces and APIs 189 11.4.5 Denial of Service 190 11.4.6 Malicious Insiders 190 11.4.7 Abuse of Cloud Users 190 11.4.8 Inadequate Due Diligence 191 11.4.9 Vulnerabilities in Shared Technology 191 11.5 Security as a Service in Cloud 191 11.6 Summary 194 Exercises 194 References 195 12 Privacy Preservation Issues in Cloud Computing 197Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 12.1 Privacy Issues in Cloud Storage 198 12.1.1 Encryption Methods 198 12.1.2 Access Control Mechanisms 199 12.1.3 Query Integrity/Keyword Searches 200 12.1.4 Auditability Schemes 200 12.2 Privacy and Security 201 12.2.1 Performance Unpredictability, Latency and Reliability 202 12.2.2 Portability and Interoperability 203 12.2.3 Data Breach Through Fiber-Optic Networks 204 12.2.4 Data Storage over IP Networks 204 12.2.5 Data Storage and Security in Cloud 205 12.3 Threats to Security in Cloud Computing 208 12.3.1 Basic Security 208 12.3.2 Network-Level Security 209 12.3.3 Application-Level Security 211 12.4 Security Issues in Cloud Deployment Models 215 12.4.1 Security Issues in a Public Cloud 215 12.4.2 Security Issues in a Private Cloud 216 12.5 Ensuring Security Against Various Types of Attacks 217 12.6 Survey of Privacy Preservation Using Fuzzy Set and Genetic Algorithm 219 12.6.1 Fuzzy-Based Approach for Privacy-Preserving Publication of Data 219 12.6.2 Privacy-Preserving Fuzzy Association Rules Hiding in Quantitative Data 220 12.6.3 A Rough Computing-Based Performance Evaluation Approach for Educational Institutions 222 12.6.4 A New Method for Preserving Privacy in Quantitative Association Rules Using Genetic Algorithm 223 12.6.5 Privacy Preserving in Association Rules Using a Genetic Algorithm 224 12.7 Summary 225 Exercises 225 References 226 13 Applications of Wireless Sensor Network in Cloud 233Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 13.1 Introduction 234 13.2 Architectural Issues of Combining Cloud Computing and Wireless Sensor Networks 234 13.3 Sensor Network Overview 235 13.3.1 Terminology 235 13.3.2 Routing Protocols in WSNs 236 13.4 Application Scenarios 237 13.4.1 Military Use 237 13.4.2 Weather Forecasting 237 13.4.3 Healthcare 238 13.4.4 Transport Monitoring 238 13.5 Summary 238 Exercises 239 References 239 14 Applications of Mobile Cloud Computing 243Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 14.1 What is Mobile Cloud Computing? 244 14.2 The Architecture of Mobile Cloud Computing 245 14.3 Characteristics of Mobile Cloud Computing 245 14.4 Advantages of Mobile Cloud Computing 246 14.5 Mobile Cloud Applications 248 14.5.1 Mobile Commerce 248 14.5.2 Mobile Learning 249 14.5.3 Mobile Healthcare 249 14.5.4 Mobile Gaming 250 14.5.5 Mobile Social Network 251 14.5.6 Multimedia Sharing 252 14.6 Summary 252 Exercises 252 References 253 15 Big Data in Cloud Computing 257Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 15.1 Introduction to Big Data 258 15.2 Big Data vs. Cloud Computing 259 15.3 Big Data and the Cloud 261 15.4 Cloud Computing to Support Big Data 262 15.4.1 Cloud Storage for Big Data Storage 262 15.4.2 Cloud Computing for Big Data Processing 262 15.4.3 Cloud Computing for Big Data Analytics 263 15.4.4 Cloud Computing for Big Data Sharing and Remote Collaboration 263 15.5 Opportunities and Challenges 263 15.5.1 Pros of Putting Big Data in the Cloud 263 15.5.2 Potential Challenges of Big Data in the Cloud 264 15.6 Summary 265 Exercises 265 References 266 Part IV: Cloud Computing Simulator Tools 269 16 CloudSim: A Simulator for Cloud Computing Environment 271Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 16.1 Introduction 272 16.2 Main Features 272 16.3 CloudSim Architecture 273 16.3.1 Modeling the Cloud 274 16.3.2 Modeling the VM Allocation 275 16.3.3 Modeling the Cloud Market 276 16.3.4 Modeling the Network Behavior 276 16.3.5 Modeling a Federation of Clouds 276 16.3.6 Modeling Dynamic Workloads 277 16.3.7 Modeling Data Center Power Consumption 278 16.3.8 Modeling Dynamic Entities Creation 278 16.4 Design and Implementation of CloudSim 279 16.5 Setting up Development Environments 282 16.6 How to Use CloudSim with Eclipse 282 References 285 17 OpenFaaS 287Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 17.1 Introduction 288 17.2 OpenFaaS Architecture 288 17.3 OpenFaaS Installation 289 17.3.1 Development Environment with Docker Swarm 290 17.3.2 Multi-Node Cluster with Docker Swarm 291 17.3.3 Production Environment with Kubernetes 293 17.3.4 Installing OpenFaaS Using Helm 297 17.3.5 Install OpenShift 298 17.4 Considerations 300 17.5 Operation of OpenFaaS 300 17.5.1 Setup and Configuration of the Open FaaS Command Line Tool 300 17.5.2 OpenFaaS Store 301 17.5.3 Management and Usage of Functions 301 17.5.4 Development of Functions 302 17.5.5 Working with Docker Registries 302 17.5.6 Web UI 303 References 303 18 OpenNebula 305Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal 18.1 Project Goal and Environment 306 18.2 Set Up Masternode with Frontend 306 18.2.1 Install Components 306 18.2.2 Starting the Frontend 306 18.3 Set Up Worker Node with KVM 307 18.3.1 Install Components 307 18.3.2 Establish an SSH Communication Pipeline between Master and Worker 308 18.3.3 Network Configuration 308 18.4 Register Worker Node 308 18.5 Deploy VM 309 References 311 19 OpenStack 313Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik 19.1 OpenStack 314 19.2 Terminologies in OpenStack 314 19.3 OpenStack Architecture 315 19.3.1 Compute (Nova) 316 19.3.2 Networking (Neuron) 316 19.3.3 Image 316 19.3.4 Object Storage (Swift) 316 19.3.5 Block Storage (Cinder) 316 19.4 Logical Architecture 317 19.5 OpenStack Installation Guide 318 19.5.1 Hardware Requirements 318 19.5.2 Networking Requirements 319 19.6 OpenStack Work 321 References 322 20 Eucalyptus 325Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik 20.1 Introduction to Eucalyptus 326 20.1.1 Eucalyptus Overview 326 20.1.2 Eucalyptus Architecture 326 20.1.3 Eucalyptus Components 327 20.2 Eucalyptus Installation 328 20.2.1 System Requirements 329 20.2.2 Services Placement 330 20.2.3 Eucalyptus Features 331 20.2.4 Networking Modes 332 20.2.5 Install Repositories 332 20.3 Configure Eucalyptus 335 20.4 Amazon Web Services Compatibility 337 References 337 Glossary 339 Authors 365
£153.90
Pearson Education (US) Learning Amazon Web Services AWS
Book SynopsisMark Wilkins is an Electronic Engineering Technologist with a wealth of experience in designing, deploying, and supporting software and hardware technology in the corporate and small business world. Since 2013, Mark has focused on supporting and designing cloud service solutions with Amazon Web Services, Microsoft Azure, and the IBM Cloud. He is certified in Amazon Web Services (Architecture and Sys-Ops). Mark is also a Microsoft Certified Trainer (MCT) and holds certifications in MCTS, MCSA, Server Virtualization with Windows Server Hyper-V, and Azure Cloud Services. Mark worked as a technical evangelist for IBM SoftLayer from 2013 through 2016 and taught both SoftLayer Fundamentals and SoftLayer Design classes to many Fortune 500 companies in Canada, the United States, Europe, and Australia. As course director for Global Knowledge, Mark developed and taught many technical seminars, including Configuring Active Directory Services, Configuring Group Policy, and Cloud anTable of ContentsPreface xix Chapter 1 Learning AWS 1 Chapter 2 Designing with AWS Global Services 29 Chapter 3 AWS Networking Services 77 Chapter 4 Compute Services: AWS EC2 Instances 147 Chapter 5 Planning for Scale and Resiliency 209 Chapter 6 Cloud Storage 255 Chapter 7 Security Services 315 Chapter 8 Automating AWS Infrastructure 373 Index 409
£28.49
Pearson Education (US) Implementing Cisco HyperFlex Solutions
Book SynopsisJalpa Patel (CCIE No. 42465) is a senior technical leader in the Customer Experience group at Cisco Systems. Her areas of interest include Cisco Unified Computing System and virtualization, hyperconverged infrastructure solutions,application-centric SDN for application agility and data center automation, and Nexus switches, which are the foundation for a next-generation unified fabric data center. She is currently focusing on building SaaS solutions for all data center technologies. Jalpa has over 18 years of experience in networking and system management. She is leading innovation within Cisco to change support models. She has authored and published IEEE papers and regularly presents at industry conferences. Jalpa holds a M.S. degree in telecommunication networks from New York University and a B.S. degree in electronics and communications from a Gujarat university in India. She has also earned an advanced program management certificate from Table of ContentsPreface xix Introduction 1 Introduction to HCI 3 Cisco's HCI Solution: HyperFlex Overview 4 Deployment Options of Cisco HyperFlex 6 Cisco HyperFlex Advantages 7 Chapter 1 Overview of Data Center Products 15 Cisco Unified Computing System 15 UCS-B Series Products 16 Cisco UCS Manager (UCSM) 20 UCS-C Series Products 22 UCS-S Series Products 23 Cisco Intersight Cloud-Based Management (SaaS Solution) 23 HyperFlex Data Platform 24 HyperFlex Hybrid Nodes 25 HyperFlex All Flash Nodes 26 HyperFlex Edge for Remote and Branch Offices 27 Cisco HyperFlex HX-Series System Management Components 28 Cisco MDS 9000 Multilayer Director SAN Switches 29 Cisco MDS 9700 Series Multilayer Director 30 Cisco MDS 9500 Series Multilayer Director 31 Network Switches 31 Nexus 5000 Series Products 31 Nexus 9000 Series Products 33 Hypervisors 36 VMWare vSphere Hypervisor 37 Microsoft Hyper-V 38 Summary 39 Chapter 2 HyperFlex Architecture 41 HyperFlex Architecture Components 42 Storage Controller Virtual Machine 42 HX Services 43 IO Visor 44 Log Structure File System 44 Data Optimization 45 HyperFlex Cleaner 45 Cluster Resource Manager (CRM) 46 Zookeeper 46 HyperFlex HX-Series Node Overview 47 HX220 M5/M4 Series 47 HX240 M5/M4 Series 49 HXAF220c-M5N All-NVMe 51 All Flash, Hybrid, and All-NVMe 51 Cisco HyperFlex Compute-Only Nodes 52 Physical Installation 52 Supported Media 54 Physical Topology 58 HyperFlex Standard Cluster/HyperFlex Extended Cluster Topology 58 HyperFlex Stretch Cluster Topology 63 HyperFlex Edge Cluster Topology 64 Summary 73 Chapter 3 Installing HyperFlex 75 Installation Prerequisites 76 Cisco HyperFlex HX-Series System Components 77 Cisco UCS Fabric Interconnects (FIs) 78 Cisco Nexus Switches 78 HyperFlex Software Versions 78 Host Requirements 79 Disk Requirements 79 Browser Recommendations 81 Port Requirements 81 HyperFlex External Connections 87 UCS/Fabric Interconnect Network Provisioning 88 Configuration for HyperFlex 3.5 88 Network Settings 91 VLAN and vSwitch Requirements 91 Cisco UCS Requirements 92 Hypervisor Requirements 93 Storage Cluster Requirements 94 vCenter Configuration Requirements 95 System Services Requirements 96 CPU Resource Reservation for Controller VMs 96 Memory Resource Reservation for Controller Virtual Machines 97 Controller VM Locations 97 Auto-Support Requirements 100 Single Sign-On Requirements 101 Installing Cisco HyperFlex System Servers 101 Physical Connectivity Illustrations for Direct Connect Mode Cluster Setup 101 Installation Workflow 103 Deploy the HX Data Platform Installer OVA by Using the vSphere Web Client 104 Configuring and Deploying a Standard HyperFlex Cluster 107 Installing HyperFlex Edge/Robo Cluster (ESXi, 3 Node) 120 HyperFlex Edge Deployment Options 121 Installation Overview 121 Configuring and Deploying a HyperFlex Edge Cluster (Gigabit Ethernet Only) 123 Configuring and Deploying a HyperFlex Edge Cluster (10 Gigabit Ethernet Only) 128 HyperFlex Edge Postinstallation Tasks 129 Installing a HyperFlex Stretch Cluster (ESXi) 130 Preinstallation Checklist 130 Deploying the Witness Node 134 HyperFlex Stretch Cluster Network IP Addressing 136 HyperFlex Stretch Cluster Guidelines 138 HyperFlex Stretch Cluster Limitations 138 HyperFlex Stretch Cluster Installation 139 HyperFlex Stretch Cluster Postinstallation 150 Summary 150 Chapter 4 Managing HyperFlex 151 Logging in to HyperFlex Connect 151 Local Access 151 Role-Based Access Control 152 Dashboard Page 154 Settings Page 155 Alarms Page 160 Events Page 162 Activity Page 163 Performance Page 164 System Information Page 165 Datastores Page 169 Virtual Machines Page 171 Upgrade Page 172 Web CLI Page 174 Replication 175 Replication Pairing 176 Encryption 177 Summary 181 Chapter 5 Maintaining HyperFlex 183 HyperFlex Licensing 184 Registering a Cluster with Smart Licensing 184 Registering a Cluster with Smart Software Licensing Through a Controller VM 188 Virtual Machine Management 189 HX Data Platform Native Snapshots Overview 190 ReadyClones 199 Datastores 205 Scaling HyperFlex Clusters 207 Node Expansion 207 Expanding a Stretch Cluster 213 Removing Nodes 217 Increasing Storage Capacity by Adding Drives 225 Hardware (Disk) Replacement 225 Replacing SSDs 225 Replacing or Adding HDDs 229 Upgrading HyperFlex Software 230 Upgrading HyperFlex 230 Pre-Upgrade Workflow 231 Downloading UCS Infra, B-Series, C-Series, and Storfs Bundles 232 Verifying the Pre-Upgrade UCS Server Firmware (C-Bundle) Version 234 Pre-Upgrade Validation 235 Hypercheck Utility 242 Upgrading UCS Infrastructure Firmware 248 Upgrade Procedure 252 Post-Upgrade Check 261 Summary 261 Chapter 6 Advanced Features 263 Data Protection 263 Replication Overview 265 Port Requirements for Replication 265 Replication Considerations 266 Recovery Considerations 267 Replication Networking Overview 267 Replication Network Considerations 269 M*N Connectivity Between Clusters 269 Configuring a Replication Network in HX Connect 270 Replication Pair Overview 273 Procedure for Creating Replication Pair 274 Protecting Virtual Machines 276 Creating Protection Groups 277 Protecting Virtual Machines 279 Disaster Recovery Overview 281 Compatibility Matrix for Disaster Recovery Operations 281 Testing Virtual Machine Recovery 282 Recovering Virtual Machines 284 Plan Migration 285 HyperFlex Backup 286 Veeam Availability Suite 286 Changed Block Tracking 288 Cohesity 289 Cohesity Protection 289 Cohesity Recovery 290 Commvault 290 Summary 291 Chapter 7 Deploying HyperFlex Anywhere with Cisco Intersight 293 Cloud-Based Management 293 HyperFlex Cluster Policies in Intersight 296 Cisco HyperFlex Edge Cluster Deployment 297 Intersight Arbitrator Overview for 2-Node 298 Physical Topology 299 Cisco HyperFlex Edge Single-Switch Configuration 299 Cisco HyperFlex Edge Dual-Switch Configuration 300 Logical Topology 301 Installing Cisco HyperFlex Edge with the Cisco Intersight Platform 304 Standard UCSM Managed HyperFlex Cluster Deployment 321 Summary 322 Index 323
£40.49
Pearson Education (US) Oracle Cloud Infrastructure A Guide to Building
Book SynopsisJeevan Gheevarghese Joseph is a senior principal product manager in the Containers and Kubernetes Services group within Oracle Cloud Infrastructure. He focuses on product strategy for containers and Kubernetes platforms at OCI. Jeevan also works with strategic customers as an advisor to help them make the most of Oracle's tooling and technology platforms. Jeevan's interests include application architecture, developer tooling, automation, and cross-product integration. Before his current role, he held positions in the Oracle A-Team and Oracle Data Cloud. He routinely speaks at developer events and industry conferences. Adao Oliveira Junior has been working in the technology industry for more than two decades, with five years of experience in cloud native solutions. He is a senior principal solutions architect who excels at gathering high-level requirements and turning them into technical solutions, aiding customers and partners worldwide. AdaoTable of ContentsChapter 1 Introduction to Oracle Cloud Infrastructure 1 Realms, Regions, and Availability Domains 2 Tenancies and Compartments 4 Controlling Access to Resources 5 Cloud Guard and Security Zones 10 Service Limits and Cost Management 11 Getting Started with Your Tenancy 14 Setting Up Users and Groups 14 Setting Up API Keys and Auth Tokens 15 Planning How Your Teams Will Use OCI 16 Summary 18 References 18 Chapter 2 Infrastructure Automation and Management 19 One Set of APIs, Different Ways to Call Them 19 A Quick Terraform Primer 20 A Basic Introduction to the Terraform Language 23 Terraform State Tracking 25 The OCI Terraform Provider 26 Setting Up the OCI Terraform Provider 26 Managing OCI Resources with Terraform 29 Simplifying Infrastructure Management with the Resource Manager Service 31 Helm and Kubernetes Providers 33 Generating Resource Manager Stacks 36 Resource Discovery 36 Drift Detection 38 Generating a User Interface from Terraform Configurations with a Custom Schema 38 Publishing Your Stacks with Deploy Buttons 49 Managing Multiregion and Multicloud Configurations 51 Summary 53 References 54 Chapter 3 Cloud Native Services on Oracle Cloud Infrastructure 55 Oracle Container Image Registry 56 Working with OCIR 58 Image Signing 59 Image Scanning 60 Creating Containers from Images 61 Compute Instances 62 Container Instances 63 Container Engine for Kubernetes 65 Service Mesh 69 Serverless Functions 71 API Gateways 73 Components of an API Gateway 74 Working with the API Gateway Service 75 Messaging Systems 79 Streaming 80 Understanding the Streaming Service 81 Working with the OCI Streaming Service 82 OCI Events Service 88 Summary 91 References 91 Chapter 4 Understanding Container Engine for Kubernetes 93 Monoliths and Microservices 93 Containers 94 Container Orchestration and Kubernetes 95 Oracle Container Engine for Kubernetes 96 OCI-Managed Components and Customer-Managed Components 97 Control Plane 97 Data Plane 98 Billable Components 99 Kubernetes Concepts 100 Cloud Controller Manager 101 Nodes and Node Pools 102 Node Pool Properties 103 Worker Node Images and Shapes 103 Kubernetes Labels 108 SSH Keys 109 Tagging Your Resources 110 Creating a Cluster 110 Quick Create Cluster Workflow 111 Custom Create Cluster Workflow 113 Using the OCI Command-Line Interface 117 Using the Terraform Provider and Modules 122 Automation and Terraform Code Generation 123 Asynchronous Cluster Creation 124 Cluster Topology Considerations 124 Using Multiple Node Pools 124 Scheduling Workloads on Specific Nodes 125 Kubernetes Networking 127 Container Network Interface (CNI) 127 OCI VCN-Native Pod Networking CNI 129 Flannel CNI 130 Kubernetes Storage 130 StorageClass: Flex Volume and CSI Plug-ins 131 Updating the Default Storage Class 131 File System Storage 133 Kubernetes Load Balancer Support 137 Working with the OCI Load Balancer Service 137 SSL Termination with OCI Load Balancer 140 Working with the OCI Network Load Balancer Service 142 Specifying Reserved Public IP Addresses 144 Commonly Used Annotations 144 Understanding Security List Management Modes 146 Using Node Label Selectors 147 Security Considerations for Your Cluster 149 Cluster Topology and Configuration Security Considerations 150 Authorization Using Workload Identity and Instance Principls 156 Securing Access to the Cluster 160 OCI IAM and Kubernetes RBAC 161 Federation with an IDP 162 Summary 162 References 163 Chapter 5 Container Engine for Kubernetes in Practice 165 Kubernetes Version Support 166 Upgrading the Control Plane 167 Upgrading the Data Plane 169 Upgrading an Existing Node Pool 170 Upgrading by Adding a Node Pool 173 Alternative Host OS (Not Kubernetes Version) Upgrade Options 175 Scaling a Cluster 175 Manual Scaling 175 Autoscaling 176 Scaling Workloads and Infrastructure Together 194 Autoscaler Best Practices 195 Cluster Access and Token Generation 196 Service Account Authentication 197 Configuring DNS 199 Configuring Node Local DNS Cache 201 Configuring ExternalDNS 202 Cluster Add-ons 203 Configuring Add-ons 203 Disabling Add-ons 205 Observability: Prometheus and Grafana 205 Monitoring Stack Components 205 Installing the kube-prometheus-stack 205 Operators and OCI Service Operator for Kubernetes 208 Getting Started with Operators on OKE 209 Operators for OCI, Oracle Database, and Oracle WebLogic 210 Troubleshooting Nodes with Node Doctor 214 Configuring SR-IOV Interfaces for Pods on OKE Using Multus 218 Using Bare Metal Nodes 218 Using Virtual Machine Nodes 226 Summary 238 References 239 Chapter 6 Securing Your Workloads and Infrastructure 241 Kubernetes Security Challenges 241 Concepts of Kubernetes Security 242 4Cs of Kubernetes Security 242 Securing Oracle Cloud Infrastructure Container Engine for Kubernetes (OKE) 243 Private Clusters 244 Kubernetes Role-Based Access Control (RBAC) with OCI IAM Groups 248 Data Encryption and Key Management Service 250 Audit Logging 253 Security Zones 255 Network Security Groups (NSGs) 256 Web Application Firewall (WAF) 257 Network Firewall 262 Allowed Registries 264 Cloud Guard 266 Hardening Containers and OKE Worker Nodes 267 Container Scanning 268 Container Image Signing 270 Center for Internet Security (CIS) Kubernetes Benchmarks 270 Using SELinux with OKE 272 Worker Nodes Limited Access 275 Securing Your Workloads 275 Security Context 275 syscalls and seccomp 278 Open Policy Agent (OPA) 280 OPA Gatekeeper 283 Open Web Application Security Project (OWASP) 285 Supporting Tools 287 External Container Scanning Tools 287 CIS-CAT Pro Assessor 287 Kube-bench 289 AppArmor 291 Falco 293 Tracee 293 Trivy 294 National Institute of Standards and Technology (NIST) Kubernetes Benchmarks 294 NIST Kubernetes Benchmarks 295 National Checklist Program Repository 296 National Vulnerability Database 296 NIST SP 800-190 Application Container Security Guide 296 Summary 296 References 297 Chapter 7 Serverless Platforms and Applications 299 Container Instances 300 Architecture 300 Using Container Instances 301 Serverless Functions 305 OCI Functions 306 Using OCI Functions 306 Building Your First Function 308 Adding an API Gateway 314 Function Logs and Distributed Tracing 315 Service Mesh 319 Using the Service Mesh 320 Adding a Service Mesh to an Application 321 Summary 330 References 330 Chapter 8 Observability 331 OCI Monitoring 331 Alarms 336 OCI Logging 338 Service Logs 340 Custom Logs 341 Audit Logs 343 Auditing OKE Activity 345 Advanced Observability in OCI 347 Logging Analytics 347 Enabling and Using Logging Analytics 349 Prometheus and Grafana with OKE 349 Using the OCI DataSource Plug-ins for Grafana 353 eBPF-Based Monitoring with Tetragon on OKE 353 Tetragon: eBPF-Based Security Observability and Enforcement 354 Running Tetragon on Oracle Container Engine for Kubernetes (OKE) 355 Summary 359 References 360 Chapter 9 DevOps and Deployment Automation 361 OCI DevOps Service 362 Code Repositories 363 Triggers 364 Build Pipelines 364 Artifacts 368 Environments 370 Deployment Pipelines 370 Elastically Scaling Jenkins on Kubernetes 376 Setting Up Jenkins on OKE 377 GitOps with ArgoCD 380 Setting Up Argo CD on OKE 381 Summary 384 References 384 Chapter 10 Bringing It Together: MuShop 385 Architecture 386 Source Code Structure 388 Services 390 Storefront 390 API 391 Catalog 391 Carts 392 User 392 Orders 393 Fulfillment 393 Payment 394 Assets 394 DBTools 394 Edge Router 394 Events 395 Newsletter Subscription 395 Load 395 Building the Services 395 Infrastructure Automation 398 Helm Charts 399 Utilities and Supporting Components 402 Deploying MuShop 403 Summary 405 References 406 9780137902538 TOC 10/30/2023
£40.49
Pearson Education (US) Designing and Developing Secure Azure Solutions
Book SynopsisMichael Howard is a 30-year Microsoft veteran and is currently a Principal Security Program Manager in the Azure Data Platform team, working on security engineering. He is one of the original architects of the Microsoft Security Development Lifecycle and has helped diverse customers such as government, military, education, finance, and healthcare secure their Azure workloads. He was the application security lead for the Rio 2016 Olympic games, which were hosted on Azure. Heinrich Gantenbein is a Senior Principal Consultant on Cybersecurity in Microsoft's Industry Solutions Delivery. With 30+ years of experience in software engineering and more than 30 years of experience in consulting, he brings a wealth of practical know-how to his role. Heinrich specializes in Azure security, threat modeling, and DevSecOps. Simone Curzi is a Principal Consultant from Microsoft's Industry Solutions Delivery. He has 20+ years of experiTable of ContentsPART I SECURITY PRINCIPLES CHAPTER 1 Secure development lifecycle processes CHAPTER 2 Secure design CHAPTER 3 Security patterns CHAPTER 4 Threat modeling CHAPTER 5 Identity, authentication, and authorization CHAPTER 6 Monitoring and auditing CHAPTER 7 Governance CHAPTER 8 Compliance and risk programs PART II SECURE IMPLEMENTATION CHAPTER 9 Secure coding CHAPTER 10 Cryptography in Azure CHAPTER 11 Confidential computing CHAPTER 12 Container security CHAPTER 13 Database security CHAPTER 14 CI/CD security CHAPTER 15 Network security Appendix A: Core cryptographic techniques
£29.59
MIT Press Ltd Cloud and Cognitive Computing A Machine Learning
Book Synopsis
£93.59
Elsevier Science & Technology Cloud Computing: Theory and Practice
Book Synopsis
£49.46
CRC Press Sensors Cloud and Fog
Book SynopsisThis book provides an in-depth understanding of Internet of Things (IoT) technology. It highlights several of today''s research and technological challenges of translating the concept of the IoT into a practical, technologically feasible, and business-viable solution. It introduces two novel technologies--sensor-cloud and fog computing--as the crucial enablers for the sensing and compute backbone of the IoT. The book discusses these two key enabling technologies of IoT that include a wide range of practical design issues and the futuristic possibilities and directions involving sensor networks and cloud and fog computing environments towards the realization and support of IoT.Classroom presentations and solutions to end of chapter questions are available to instructors who use the book in their classes.Table of ContentsContentsForeword ..................................................................................................... xiiiPreface ..........................................................................................................xvAcknowledgments ........................................................................................xixAbout the Authors ........................................................................................xxiPART I INTRODUCTION1 History and Evolution of Cloud Computing .....................................31.1 Introduction .................................................................................. 31.1.1 Classification of Cloud Computing .................................... 41.1.2 Cloud Computing Deployment Models ............................. 41.1.3 Cloud Computing Service Models ...................................... 61.2 Computation in Cloud .................................................................. 71.2.1 Resource Management ........................................................ 81.2.2 Virtualization .................................................................... 111.2.3 Green Computing ............................................................. 161.3 Cloud Applications ...................................................................... 171.4 Summary ..................................................................................... 18Reference ..................................................................................... 192 Sensor Networks and the Cloud ......................................................252.1 Wireless Sensor Networks ............................................................ 262.1.1 Background and Evolution ............................................... 262.1.2 Design of a Sensor Node ................................................... 322.1.3 Applications of Sensor Networks ...................................... 332.1.4 Challenges and Constraints ............................................... 342.2 Unification of WSNs with Cloud: Dawn of a New Era ............... 362.2.1 The Significance of Cloud Computing ............................. 362.2.2 How Does Integration Work? Example Scenarios ............. 372.2.3 Challenges ........................................................................ 402.3 Summary ..................................................................................... 41Reference ..................................................................................... 433 Introduction to the Internet of Things ............................................473.1 Inception and Background ........................................................... 483.1.1 Definition ......................................................................... 483.1.2 Characteristics ................................................................... 503.2 IoT Middleware ........................................................................... 523.3 IoT Applications .......................................................................... 543.3.1 Healthcare ........................................................................ 553.3.2 Smart City Applications .................................................... 553.3.3 Smart Home ..................................................................... 553.3.4 Telecommunication .......................................................... 563.3.5 Supply Chain Management .............................................. 563.4 Open Research Challenges and Future Trends ............................. 563.5 Summary ..................................................................................... 59Reference ..................................................................................... 60PART 2 THE SENSOR-CLOUD PARADIGM4 The Sensor-Cloud vs. Sensors and the Cloud ..................................654.1 What Is the Sensor-Cloud? .......................................................... 664.2 Background of the Sensor-Cloud ................................................. 674.2.1 Motivation of the Sensor-Cloud ....................................... 674.2.2 Actors of the Sensor-Cloud ............................................... 684.2.3 Architecture of the Sensor-Cloud ...................................... 694.2.4 Views of the Sensor-Cloud ................................................ 704.3 Sensor Virtualization .................................................................... 734.3.1 Configurations of Virtualization ....................................... 734.3.2 Characterization of Virtualization ..................................... 744.4 Sensor-Cloud Applications ........................................................... 764.4.1 Case Studies ...................................................................... 764.5 Some Insights .............................................................................. 794.5.1 Performance Metrics ......................................................... 794.5.2 Performance Evaluation .................................................... 814.6 Summary ..................................................................................... 84Reference ..................................................................................... 865 Data Flow in the Sensor-Cloud ........................................................895.1 Introduction ................................................................................ 895.2 Composition of a Virtual Sensor .................................................. 895.2.1 Algorithms for Optimal Composition ............................... 915.2.2 CoV-I: Composition of VS within the Same Region ........ 915.2.3 CoV-II: Composition of VS and VSG acrossMultiple Regions .............................................................. 925.2.4 Performance Evaluation of CoVs ...................................... 935.3 Data Management ....................................................................... 945.3.1 Data Caching .................................................................... 945.3.2 Data Transmission .......................................................... 1015.4 Summary ................................................................................... 110Reference ................................................................................... 1126 Pricing and Networking in the Sensor-Cloud ................................1156.1 Scenario for Pricing .................................................................... 1166.2 The Model for Pricing ............................................................... 1166.2.1 Assumptions of the Model .............................................. 1176.3 pH: Pricing Attributed to Hardware .......................................... 1196.3.1 Selection of the Next Hop Node .................................... 1196.3.2 Context-Aware Pricing .................................................... 1206.4 pI: Pricing Attributed to Infrastructure ...................................... 1216.5 Real-Life Applicability: A Case Study ........................................ 1236.6 Networking ................................................................................ 1236.7 System Description .................................................................... 1266.8 Formal Definition of the Problem .............................................. 1266.9 Complexity Analysis .................................................................. 1296.10 Summary ................................................................................... 130Reference ................................................................................... 1317 Sensor-Cloud for Internet of Things ..............................................1337.1 Introduction .............................................................................. 1337.2 Enabling IoT through Sensor-Cloud .......................................... 1347.2.1 Contributions through Architecture ................................ 1347.2.2 Contributions through Functionalities ............................ 1377.2.3 Contributions through the Life Cycle ............................. 1377.3 Summary ................................................................................... 139Reference ................................................................................... 141PART III FROM THE CORE TO THE EDGE: FOG8 Fog: The Next-Gen Cloud .............................................................1458.1 Introduction to Fog Computing ................................................ 1468.1.1 Where Does Cloud Computing Fall Short? .................... 1478.1.2 Definition ....................................................................... 1498.1.3 Fog versus Other Computing Paradigms ........................ 1518.1.4 Where There Is Fog, There Is Cloud .............................. 1588.2 Characteristics of Fog Computing ............................................. 1608.3 Advantages of Fog Computing ................................................... 1618.4 Summary ................................................................................... 163Reference ................................................................................... 1649 Fog Computing Applications .........................................................1679.1 IoT Applications and Fog Computing ....................................... 1689.2 Fog Applications ........................................................................ 1709.2.1 Healthcare and Well-being ............................................. 1709.2.2 Smart Vehicle Management ............................................ 1739.2.3 Smart City Applications .................................................. 1759.2.4 Smart Data Management ................................................ 1789.2.5 Other Emerging Application Sectors ............................... 1809.3 Summary ................................................................................... 180Reference ................................................................................... 18110 Fog Architecture .............................................................................18710.1 The Comprehensive Framework ................................................ 18710.1.1 Communication and Network Model ........................ 18910.2 Mathematical Model of the System ............................................ 19010.3 Application Agnostic Fog Architectures ...................................... 19510.3.1 Programming Models ................................................. 19610.4 Application-Specific Fog Architectures ....................................... 19910.4.1 Fog Architectures for Healthcare ................................ 19910.4.2 Fog Architectures for Smart City Environments ......... 20310.4.3 Other Application-Specific Fog Architectures ............. 20510.5 Summary ................................................................................... 207Reference ................................................................................... 20811 Towards a “Green”-er Internet of Things ......................................21311.1 Reference Model ........................................................................ 21411.1.1 Assumptions ............................................................... 21511.1.2 Reference Architecture ................................................ 21511.2 Networking Model ..................................................................... 21611.3 Performance Metrics .................................................................. 21811.3.1 Power Consumption ................................................... 21911.3.2 Service Latency ........................................................... 22311.4 A Case Study: Simulation Setup ................................................. 22611.4.1 Network Topology ..................................................... 22611.4.2 Network Traffic .......................................................... 22711.4.3 Performance Metrics ................................................... 22711.5 A Case Study: Performance Evaluation ...................................... 22811.5.1 Service Latency ........................................................... 22811.5.2 Power Consumption ................................................... 22911.5.3 CO2 Emission ............................................................. 23011.5.4 Cost ............................................................................ 23211.6 Summary .................................................................................... 232Reference ................................................................................... 23412 Security in the IoT .........................................................................23712.1 Introduction ............................................................................... 23712.1.1 IoT Security vs. Conventional Security ...................... 23712.1.2 Difference between Security and Privacy .................... 23812.2 Security in the IoT ..................................................................... 23812.2.1 Protocol Stack for the IoT .......................................... 24012.2.2 Security Threats in the IoT ......................................... 24112.3 Misbehavior in M2M Communication ...................................... 24412.3.1 Where Do We Stand? ................................................. 24512.3.2 Problem Scenario ........................................................ 24612.3.3 System Model ............................................................. 24712.3.4 Operation ................................................................... 24712.3.5 Quantitative Results ................................................... 24912.4 Summary .................................................................................... 251Reference ................................................................................... 253Index ...........................................................................................................257
£62.99
Taylor & Francis Ltd The Cloud Computing Book
Book SynopsisThis latest textbook from bestselling author, Douglas E. Comer, is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of Computing Explained gives readers a complete picture of the advantages and growth of cloud computing, cloud infrastructure, virtualization, automation and orchestration, and cloud-native software design.The book explains real and virtual data center facilities, including computation (e.g., servers, hypervisors, Virtual Machines, and containers), networks (e.g., leaf-spine architecture, VLANs, and VxLAN), and storage mechanisms (e.g., SAN, NAS, and object storage). Chapters on automation and orchestration cover the conceptual organization of systems that automate software deployment and scaling. Chapters on cloud-native software cover parallelism, microservices, MapReduce, controlTable of ContentsPreface PART I The Era Of Cloud Computing The Motivations For Cloud 1.1 Cloud Computing Everywhere 1.2 A Facility For Flexible Computing 1.3 The Start Of Cloud: The Power Wall And Multiple Cores 1.4 From Multiple Cores To Multiple Machines 1.5 From Clusters To Web Sites And Load Balancing 1.6 Racks Of Server Computers 1.7 The Economic Motivation For A Centralized Data Center 1.8 Origin Of The Term “In The Cloud” 1.9 Centralization Once Again Elastic Computing And Its Advantages 2.1 Introduction 2.2 Multi-Tenant Clouds 2.3 The Concept Of Elastic Computing 2.4 Using Virtualized Servers For Rapid Change 2.5 How Virtualized Servers Aid Providers 2.6 How Virtualized Servers Help A Customer 2.7 Business Models For Cloud Providers 2.8 Intrastructure as a Service (IaaS) 2.9 Platform as a Service (PaaS) 2.10 Software as a Service (SaaS) 2.11 A Special Case: Desktop as a Service (DaaS) 2.12 Summary Type Of Clouds And Cloud Providers 3.1 Introduction 3.2 Private And Public Clouds 3.3 Private Cloud 3.4 Public Cloud 3.5 The Advantages Of Public Cloud 3.6 Provider Lock-In 3.7 The Advantages Of Private Cloud 3.8 Hybrid Cloud 3.9 Multi-Cloud 3.10 Hyperscalers 3.11 Summary PART II Cloud Infrastructure And Virtualization Data Center Infrastructure And Equipment 4.1 Introduction 4.2 Racks, Aisles, And Pods 4.3 Pod Size 4.4 Power And Cooling For A Pod 4.5 Raised Floor Pathways And Air Cooling 4.6 Thermal Containment And Hot/Cold Aisles 4.7 Exhaust Ducts (Chimneys) 4.8 Lights-Out Data Centers 4.9 A Possible Future Of Liquid Cooling 4.10 Network Equipment And Multi-Port Server Interfaces 4.11 Smart Network Interfaces And Offload 4.12 North-South And East-West Network Traffic 4.13 Network Hierarchies, Capacity, And Fat Tree Designs 4.14 High Capacity And Link Aggregation 4.15 A Leaf-Spine Network Design For East-West Traffic 4.16 Scaling A Leaf-Spine Architecture With A Super Spine 4.17 External Internet Connections 4.18 Storage In A Data Center 4.19 Unified Data Center Networks 4.20 Summary Virtual Machines 5.1 Introduction 5.2 Approaches To Virtualization 5.3 Properties Of Full Virtualization 5.4 Conceptual Organization Of VM Systems 5.5 Efficient Execution And Processor Privilege Levels 5.6 Extending Privilege To A Hypervisor 5.7 Levels Of Trust 5.8 Levels Of Trust And I/O Devices 5.9 Virtual I/O Devices 5.10 Virtual Device Details 5.11 An Example Virtual Device 5.12 A VM As A Digital Object 5.13 VM Migration 5.14 Live Migration Using Three Phase5.15 Running Virtual Machines In An Application 5.16 Facilities That Make A Hosted Hypervisor Possible 5.17 How A User Benefits From A Hosted Hypervisor 5.18 Summary Containers 6.1 Introduction 6.2 The Advantages And Disadvantages Of VMs 6.3 Traditional Apps And Elasticity On Demand 6.4 Isolation Facilities In An Operating System 6.5 Linux Namespaces Used For Isolation 6.6 The Container Approach For Isolated Apps 6.7 Docker Containers6.8 Docker Terminology And Development Tools 6.9 Docker Software Components 6.10 Base Operating System And Files 6.11 Items In A Dockerfile 6.12 An Example Dockerfile 6.13 Summary Virtual Networks 7.1 Introduction 7.2 Conflicting Goals For A Data Center Network 7.3 Virtual Networks, Overlays, And Underlays 7.4 Virtual Local Area Networks (VLANs) 7.5 Scaling VLANs To A Data Center With VXLAN 7.6 A Virtual Network Switch Within A Server 7.7 Network Address Translation (NAT) 7.8 Managing Virtualization And Mobility 7.9 Automated Network Configuration And Operation 7.10 Software Defined Networking 7.11 The OpenFlow Protocol 7.12 Programmable Networks 7.13 Summary Virtual Storage 8.1 Introduction 8.2 Persistent Storage: Disks And Files 8.3 The Disk Interface Abstraction 8.4 The File Interface Abstraction 8.5 Local And Remote Storage 18.6 Two Types Of Remote Storage Systems 8.7 Network Attached Storage (NAS) Technology 8.8 Storage Area Network (SAN) Technology 8.9 Mapping Virtual Disks To Physical Disks 8.10 Hyper-Converged Infrastructure 8.11 A Comparison Of NAS and SAN Technology 8.12 Object Storage 8.13 Summary PART III Automation And OrchestrationAutomation 9.1 Introduction 9.2 Groups That Use Automation 9.3 The Need For Automation In A Data Center 9.4 An Example Deployment 9.5 What Can Be Automated? 9.6 Levels Of Automation 9.7 AIops: Using Machine Learning And Artificial Intelligence 9.8 A Plethora Of Automation Tools 9.9 Automation Of Manual Data Center Practices 9.10 Zero Touch Provisioning And Infrastructure As Code 9.11 Declarative, Imperative, And Intent-Based Specifications 9.12 The Evolution Of Automation Tools 9.13 Summary Orchestration: Automated Replication And Parallelism 10.1 Introduction 10.2 The Legacy Of Automating Manual Procedures 10.3 Orchestration: Automation With A Larger Scope 10.4 Kubernetes: An Example Container Orchestration System 10.5 Limits On Kubernetes Scope 10.6 The Kubernetes Cluster Model 10.7 Kubernetes Pods 10.8 Pod Creation, Templates, And Binding Times 10.9 Init Containers 10.10 Kubernetes Terminology: Nodes And Control Plane 10.11 Control Plane Software Components 10.12 Communication Among Control Plane Components 10.13 Worker Node Software Components 10.14 Kubernetes Features 110.15 SummaryPART IV Cloud Programming ParadigmsThe MapReduce Paradigm 11.1 Introduction 11.2 Software In A Cloud Environment 11.3 Cloud-Native Vs. Conventional Software 11.4 Using Data Center Servers For Parallel Processing 11.5 Tradeoffs And Limitations Of The Parallel Approach 11.6 The MapReduce Programming Paradigm 11.7 Mathematical Description Of MapReduce 11.8 Splitting Input 11.9 Parallelism And Data Size 11.10 Data Access and Data Transmission 11.11 Apache Hadoop 11.12 The Two Major Parts Of Hadoop 11.13 Hadoop Hardware Cluster Model 11.14 HDFS Components: DataNodes And A NameNode 11.15 Block Replication And Fault Tolerance 11.16 HDFS And MapReduce 11.17 Using Hadoop With Other File Systems 11.18 Using Hadoop For MapReduce Computations 11.19 Hadoop’s Support For Programming Languages 11.20 Summary Microservices 12.1 Introduction 12.2 Traditional Monolithic Applications 12.3 Monolithic Applications In A Data Center 12.4 The Microservices Approach 12.5 The Advantages Of Microservices 12.6 The Potential Disadvantages of Microservices 12.7 Microservices Granularity 12.8 Communication Protocols Used For Microservices 12.9 Communication Among Microservices 12.10 Using A Service Mesh Proxy 12.11 The Potential For Deadlock 12.12 Microservices Technologies 12.13 Summary Controller-Based Management Software13.1 Introduction 13.2 Traditional Distributed Application Management 13.3 Periodic Monitoring 13.4 Managing Cloud-Native Applications 13.5 Control Loop Concept 13.6 Control Loop Delay, Hysteresis, And Instability 13.7 The Kubernetes Controller Paradigm And Control Loop 13.8 An Event-Driven Implementation Of A Control Loop 13.9 Components Of A Kubernetes Controller 13.10 Custom Resources And Custom Controllers 13.11 Kubernetes Custom Resource Definition (CRD) 13.12 Service Mesh Management Tools 13.13 Reactive Or Dynamic Planning 13.14 A Goal: The Operator Pattern 13.15 Summary Serverless Computing And Event Processing 14.1 Introduction 14.2 Traditional Client-Server Architecture 114.3 Scaling A Traditional Server To Handle Multiple Clients 14.4 Scaling A Server In A Cloud Environment 14.5 The Economics Of Servers In The Cloud 14.6 The Serverless Computing Approach 14.7 Stateless Servers And Containers 14.8 The Architecture Of A Serverless Infrastructure 14.9 An Example Of Serverless Processing 14.10 Potential Disadvantages Of Serverless Computing 14.11 Summary DevOps 15.1 Introduction 15.2 Software Creation And Deployment15.3 The Realistic Software Development Cycle 15.4 Large Software Projects And Teams 15.5 Disadvantages Of Using Multiple Teams 15.6 The DevOps Approach 15.7 Continuous Integration (CI): A Short Change Cycle 15.8 Continuous Delivery (CD): Deploying Versions Rapidly 15.9 Cautious Deployment: Sandbox, Canary, And Blue/Green 15.10 Difficult Aspects Of The DevOps Approach 15.11 Summary PART V Other Aspects Of Cloud Edge Computing And IIoT 16.1 Introduction 16.2 The Latency Disadvantage Of Cloud 16.3 Situations Where Latency Matters 16.4 Industries That Need Low Latency 16.5 Moving Computing To The Edge 16.6 Extending Edge Computing To A Fog Hierarchy 16.7 Caching At Multiple Levels Of A Hierarchy 16.8 An Automotive Example 16.9 Edge Computing And IIoT 16.10 Communication For IIoT 16.11 Decentralization Once Again 16.12 Summary Cloud Security And Privacy17.1 Introduction 17.2 Cloud-Specific Security Problems 17.3 Security In A Traditional Infrastructure 17.4 Why Traditional Methods Do Not Suffice For The Cloud 17.5 The Zero Trust Security Model 17.6 Identity Management 17.7 Privileged Access Management (PAM) 17.8 AI Technologies And Their Effect On Security17.9 Protecting Remote Access 17.10 Privacy In A Cloud Environment 17.11 Back Doors, Side Channels, And Other Concerns 17.12 Cloud Providers As Partners For Security And Privacy 17.13 Summary Controlling The Complexity Of Cloud-Native Systems 18.1 Introduction 18.2 Sources Of Complexity In Cloud Systems 18.3 Inherent Complexity In Large Distributed Systems 18.4 Designing A Flawless Distributed System 18.5 System Modeling 18.6 Mathematical Models 18.7 An Example Graph Model To Help Avoid Deadlock 18.8 A Graph Model For A Startup Sequence 18.9 Modeling Using Mathematics 18.10 An Example TLA+ Specification 18.11 System State And State Changes 18.12 The Form Of A TLA+ Specification 18.13 Symbols In A TLA+ Specification 18.14 State Transitions For The Example 18.15 Conclusions About Temporal Logic Models 18.16 Summary Index
£109.25
John Wiley & Sons Inc Executives Guide to Cloud Computing
Book SynopsisYour organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook, Twitter and many others also carved out important roles; in less than five years Apple''s iTunes became the largest music retailer in North America. They all share one key strategic decision each of these organizations chose to harness the power of cloud computing to power their drives to dominance. With roots in supercomputing and many other technical disciplines, cloud computing is ushering in an entirely new economic reality technology-enabled enterprises built on low cost, flexible, and limitless technical infrastructures. The Executive''s Guide to Cloud Computing reveals how you can apply the power of cloud computing throughout yoTrade Review“A very timely and invaluable resource for CIOs, CTOs, and Enterprise Architects ... extremely relevant information that will serve readers well now and far into the future.” —Bob Flores, President & CEO Applicology Inc., Former CTO of the Central Intelligence Agency “The authors have done a great job in explaining the cloud concepts. They give historical and technical background to show that cloud computing is really an evolution of numerous technologies and business strategies. It is the combination of these that enables cloud and these new business strategies to happen. This makes the fuzziness of the concept come into focus. The “technical” chapters show the CIO and Technical Architect a model for building your own strategy within the business and a path from concept to deployment with governance and business models thrown in. Darn, I keep hoping for ‘the answer’. Now my questions can dig into the real value for our enterprise and a strategy for moving forward. Great book!!!” —Dave Ploch, CIO, Novus International “‘Executive’s Guide’ is not a code-phrase for an introductory text, but a comprehensive guide for the CIO, IT decision-maker, or project leader. The authors, two entrepreneurs and pioneers in the field, speak from substantial real-world project experience. They introduce the topic and related technologies, highlight cloud drivers and strategy, address relationships to existing initiatives such as Service-Oriented Architectures, detail project phases in the implementation of and evolution to cloud-based enterprise architectures, and offer many reasoned insights along the way.” —Joe Weinman, Strategy and Business Development, AT&T Business Solutions “Executive’s Guide to Cloud Computing is a crystal ball into the future of business. Not a technical treatise but an insightful explanation of how cloud computing can quickly deliver real business value. This book is an instruction manual on how to win business in this ‘born on the web’ world.” —Kevin L. Jackson, Vice President, Dataline LLC and author of Cloud Musings, http://kevinljackson.blogspot.comTable of ContentsPreface xi CHAPTER 1 THE SOUND OF INEVITABILITY 1 A Persistent Vision 5 A Little History 6 Three Ages of Computing 6 Broad Enablers 15 Big Contributions 20 Limitations 21 I Want One of Those 22 Back to the Future? 22 Notes 23 CHAPTER 2 CONCEPTS, TERMINOLOGY,AND STANDARDS 25 Basic Concepts: The Big Stuff 27 Major Layers 34 Where They Live (Deployment Models) 36 Geographic Location 39 Datacenter Innovation 39 The Quest for Green 40 Standards 41 Much Sound and Fury . . . 42 Parting Thoughts 42 Notes 43 CHAPTER 3 CLOUD COMPUTING AND EVERYTHING ELSE 45 The Neighborhood 45 Parting Thoughts 66 Notes 67 CHAPTER 4 STRATEGIC IMPLICATIONS OF CLOUD COMPUTING 69 A Survey of Cloud Implications 70 Business Benefits of Cloud Computing 78 Cloud-Based Business Models 82 Cloud-Enabled Business Models 83 Strategic Implications of Cloud Computing 86 Evolving from SOA into the Cloud 91 When to Do SOA versus Cloud? 98 Cloud Computing Adoption Obstacles 107 Parting Thoughts: Things to Do Tomorrow 109 Notes 110 CHAPTER 5 CLOUD ADOPTION LIFECYCLE 111 Cloud Adoption Lifecycle and Cloud Modeling Framework: Two Necessary Tools for Cloud Success 112 Cloud Adoption Lifecycle 114 Cloud Adoption Lifecycle Summary 144 Parting Thoughts 145 CHAPTER 6 CLOUD ARCHITECTURE, MODELING, AND DESIGN 147 Cloud Adoption Lifecycle Model: Role of Cloud Modeling and Architecture 147 Cloud Industry Standards 149 Standards Monitoring Framework 154 A Cloud Computing Reference Model 155 Exploring the Cloud Computing Logical Architecture 157 Developing a Holistic Cloud Computing Reference Model 162 Cloud Deployment Model 170 Cloud Governance and Operations Model 174 Cloud Ecosystem Model (Supporting the Cloud Reference Model) 179 Consumption of Cloud-Enabled and Cloud Enablement Resources 184 Cloud Computing Reference Model Summary 187 Cloud Computing Technical Reference Architecture 188 Parting Thoughts 192 Notes 193 CHAPTER 7 WHERE TO BEGIN WITH CLOUD COMPUTING 195 Cloud Adoption Lifecycle 195 Where to Begin with Cloud: Using the Cloud Adoption Lifecycle 199 Where to Begin with Cloud: Deployment Model Scenarios 200 Cloud Business Adoption Patterns 204 Where to Begin with Cloud: Consumers and Internal Cloud Providers 209 Cloud Patterns Mapped to Common Cloud Use Cases 213 Parting Thoughts 224 CHAPTER 8 ALL THINGS DATA 227 The Status Quo 228 Cracks in the Monolith 230 Cloud Scale 232 The Core Issues 234 Lessons Learned 237 Solutions and Technologies: A Few Examples 239 A Look Below: Need for Combined Computation/Storage 242 Parting Thoughts 243 Notes 243 CHAPTER 9 WHY INEVITABILITY IS INEVITABLE 245 Driving Scale 27 Objections and Concerns 248 Overwhelming Rationality 253 A Natural Evolution 257 Parting Thoughts 259 Notes 260 Appendix The Cloud Computing Vendor Landscape 263 Infrastructure as a Service (IaaS) 264 Platforms as a Service (PaaS) 264 Software as a Service (SaaS) 265 Systems Integrators 265 Analysts and Services Providers 266 Parting Thoughts 266 Note 266 About the Authors 267 Index 269
£28.49
Institute of Physics Publishing Edge Intelligence
Book Synopsis
£108.00
Bernard Babani Publishing How to Start Cloud Computing
Book Synopsis
£9.49
Recursive Limited Cloud Computing Explained Implementation Handbook for Enterprises
£26.96
O'Reilly Media OpenShift for Developers
Book SynopsisWith this updated edition, you'll learn how to build, deploy, and host a modern, multi-tiered application on OpenShift. Through the course of the book, you'll learn how to use OpenShift and the Quarkus Java Framework to develop and deploy applications using proven enterprise technologies.
£33.74
O'Reilly Media Cloud Without Compromise
Book SynopsisThis practical guide provides business leaders and C-level executives with guidance and insights across a wide range of cloud-related topics, such as distributed cloud, microservices, and other open source solutions for strengthening operations.
£39.74
O'Reilly Media Efficient Go
Book SynopsisWith this book, any engineer can learn how to approach software efficiency effectively, professionally, and without stress. Author Bartłomiej Płotka provides the tools and knowledge required to make your systems faster and less resource-hungry.
£42.39
O'Reilly Media Cloud Native Security Cookbook
Book SynopsisThe fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of your own cloud native systems.
£39.74
O'Reilly Media Operating OpenShift
Book SynopsisThis practical book helps you understand and manage OpenShift clusters from minimal deployment to large multicluster installations.
£39.74
O'Reilly Media Kubernetes Security and Observability
Book SynopsisWith this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes.
£35.99
O'Reilly Media Infrastructure as Code
Book SynopsisWith this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by DevOps teams to manage cloud-age infrastructure.
£47.99
O'Reilly Media Application Delivery and Load Balancing in
Book SynopsisThis practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute to a comprehensive solution. Cloud architects Derek DeJonghe and Arlan Nugara take you through the steps necessary to design a practical solution for your network.
£21.74
O'Reilly Media The Cloud Data Lake
Book SynopsisAuthor Rukmani Gopalan, a product management leader and data enthusiast, guides data architects and engineers through the major aspects of working with a cloud data lake, from design considerations and best practices to data format optimizations, performance optimization, cost management, and governance.
£39.74
O'Reilly Media Azure Cookbook
Book SynopsisThis practical guide provides over 75 recipes to help you to work with common Azure issues in everyday scenarios. That includes key tasks like setting up permissions for a storage account, working with Cosmos DB APIs, managing Azure role-based access control, governing your Azure subscriptions using Azure Policy, and much more.
£47.99
O'Reilly Media Serverless Development on AWS
Book SynopsisSheen Brisals and Luke Hedger outline the serverless adoption requirements for an enterprise, examine the development tools your team needs, and explain in depth the nuances of testing event-driven and distributed serverless services.
£39.74
O'Reilly Media Building Serverless Applications on Knative
Book SynopsisExplore the theory and practice of designing and writing serverless applications using examples from the Knative project. With this practical guide, mid-level to senior application developers and team managers will learn when and why to target serverless platforms when developing microservices or applications.
£39.74
O'Reilly Media Kubernetes Best Practices
Book SynopsisRevised to cover all the latest Kubernetes features, new tooling, and deprecations, this book distills decades of experience from companies that are successfully running Kubernetes in production and provide concrete code examples to back the methods presented in this book.
£39.74
O'Reilly Media Kubernetes Cookbook
Book SynopsisWith this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across clusters of hosts. This fully updated second edition provides a problem-solution-discussion format with easy lookups to help you find the detailed answers you need-fast.
£39.74
John Wiley & Sons Inc Deploying and Managing a Cloud Infrastructure
Book SynopsisLearn in-demand cloud computing skills from industry experts Deploying and Managing a Cloud Infrastructure is an excellent resource for IT professionals seeking to tap into the demand for cloud administrators. This book helps prepare candidates for the CompTIA Cloud+ Certification (CV0-001) cloud computing certification exam. Designed for IT professionals with 2-3 years of networking experience, this certification provides validation of your cloud infrastructure knowledge. With over 30 years of combined experience in cloud computing, the author team provides the latest expert perspectives on enterprise-level mobile computing, and covers the most essential topics for building and maintaining cloud-based systems, including: Understanding basic cloud-related computing concepts, terminology, and characteristics Identifying cloud delivery solutions and deploying new infrastructure Managing cloud technologies, services, and networks Table of ContentsIntroduction xxiii Chapter 1 Understanding Cloud Characteristics 1 Basic Terms and Characteristics 2 Elasticity 2 On-Demand Self-service/JIT 3 Templating 4 Pay as You Grow 6 Pay-as-You-Grow Theory vs. Practice 7 Chargeback 8 Ubiquitous Access 9 Metering Resource Pooling 10 Multitenancy 11 Cloud Bursting 13 Rapid Deployment 14 Object Storage Concepts 16 File-Based Data Storage 16 Object Storage 18 Structured vs. Unstructured Data 18 REST APIs 19 Summary 25 Chapter Essentials 26 Chapter 2 To Grasp the Cloud—Fundamental Concepts 27 The True Nature of the Cloud 28 Elastic 29 Massive 29 On Demand 29 Virtualized 30 Secure 30 Always Available 30 Virtualization and Scalability 31 The True Definer of Cloud Computing 32 Serving the Whole World 32 The Cloud Hypervisor 33 Type 1 and Type 2 33 Use Cases and Examples 34 Benefits of Hypervisors 35 Hypervisor Security Concerns 35 Proprietary vs. Open Source 36 Moore’s Law, Increasing Performance, and Decreasing Enterprise Usage 36 Xen Cloud Platform (Open Source) 37 KVM (Open Source) 38 OpenVZ (Open Source) 38 VirtualBox (Open Source) 39 Citrix XenServer (Proprietary) 39 VMware vSphere/ESXi (Proprietary) 39 Microsoft Windows Server 2012 Hyper-V 41 Consumer vs. Enterprise Use 41 Workstation vs. Infrastructure 43 Key Benefits of Implementing Hypervisors 46 Shared Resources 46 Elasticity 46 Network and Application Isolation 47 Foundations of Cloud Computing 48 Infrastructure 48 Platform 49 Applications 50 Enabling Services 50 Summary 50 Chapter Essentials 51 Chapter 3 Within the Cloud: Technical Concepts of Cloud Computing 53 Technical Basics of Cloud and Scalable Computing 54 Defining a Data Center 55 Traditional vs. Cloud Hardware 62 Determining Cloud Data Center Hardware and Infrastructure 65 Optimization and the Bottom Line 70 The Cloud Infrastructure 78 Open Source 79 Proprietary 84 Summary 85 Chapter Essentials 86 Chapter 4 Cloud Management 87 Understanding Cloud Management Platforms 88 What It Means for Service Providers 90 Planning Your Cloud 90 Building Your Cloud 94 Running Your Cloud 95 What This Means for Customers 95 Service-Level Agreements 97 Policies and Procedures 97 Planning the Documentation of the Network and IP 98 Implementing Change Management Best Practices 100 Managing the Configuration 105 Managing Cloud Workloads 111 Managing Workloads Right on the Cloud 111 Managing Risk 112 Securing Data in the Cloud 113 Managing Devices 114 Virtualizing the Desktop 115 Enterprise Cloud Solution 116 Summary 116 Chapter Essentials 119 Chapter 5 Diagnosis and Performance Monitoring 121 Performance Concepts 122 Input/Output Operations per Second (IOPS) 123 Read vs. Write Files 124 File System Performance 125 Metadata Performance 127 Caching 130 Bandwidth 131 Throughput: Bandwidth Aggregation 132 Jumbo Frames 134 Network Latency 135 Hop Counts 136 Quality of Service (QoS) 137 Multipathing 137 Load Balancing 138 Scaling: Vertical vs. Horizontal vs. Diagonal 138 Disk Performance 140 Access Time 140 Data Transfer Rate 142 Disk Tuning 143 Swap Disk Space 144 I/O Tuning 144 Performance Management and Monitoring Tools 146 Hypervisor Configuration Best Practices 149 Impact of Configuration Changes 151 Common Issues 152 Summary 153 Chapter Essentials 154 Chapter 6 Cloud Delivery and Hosting Models 157 Private 158 Full Private Cloud Deployment Model 158 Semi-private Cloud Deployment Model 159 Public 160 Hybrid 160 Community 161 On-Premises vs. Off-Premises Hosting 161 On-Premises Hosting 162 Off-Premises Hosting 162 Miscellaneous Factors to Consider When Choosing between On- or Off-Premises Hosting 163 Comparing Total Cost of Ownership 166 Accountability and Responsibility Based on Delivery Models 168 Private Cloud Accountability 168 Public Cloud Accountability 169 Responsibility for Service Impairments 170 Accountability Categories 170 Security Differences between Models 171 Multitenancy Issues 171 Data Segregation 173 Network Isolation 173 Functionality and Performance Validation 174 On-Premises Performance 174 Off-Premises Performance 174 Types of Testing 175 Orchestration Platforms 175 Summary 177 Chapter Essentials 178 Chapter 7 Practical Cloud Knowledge: Install, Configure, and Manage 181 Setting Up the Cloud 183 Creating, Importing, and Exporting Templates and Virtual Machines 183 Creating Virtual Machine Templates 184 Importing and Exporting Service Templates 186 Installing Guest Tools 188 Snapshots and Cloning 189 Image Backups vs. File Backups 193 Virtual Network Interface Card 195 Virtual Disks 198 Virtual Switches 199 Configuring Virtual Machines for Several VLANs 201 Virtual Storage Area Network 203 Virtual Resource Migration 204 Establishing Migration Requirements 204 Migrating Storage 206 Scheduling Maintenance 208 Reasons for Maintenance 208 Virtual Components of the Cloud 209 Virtual Network Components 209 Shared Memory 210 Virtual CPU 211 Storage Virtualization 211 Summary 214 Chapter Essentials 215 Chapter 8 Hardware Management 221 Cloud Hardware Resources 222 BIOS/Firmware Configurations 222 Minimum Memory Capacity and Configuration 223 Number of CPUs 223 Number of Cores 224 NIC Quantity, Speeds, and Configurations 225 Internal Hardware Compatibility 225 Storage Media 226 Proper Allocation of Hardware Resources (Host) 227 Proper Virtual Resource Allocation (Tenant/Client) 232 Management Differences between Public, Private, and Hybrid Clouds 234 Public Cloud Management 234 Private Cloud Management 235 Hybrid Cloud Management 236 Tiering 236 Performance Levels of Each Tier 237 Policies 238 RAID Levels 238 File Systems 239 Summary 241 Chapter Essentials 242 Chapter 9 Storage Provisioning and Networking 245 Cloud Storage Concepts 246 Object Storage 246 Metadata 247 Data/Blob 248 Extended Metadata 248 Replicas 248 Policies and Access Control 248 Understanding SAN and NAS 249 Cloud vs. SAN Storage 250 Cloud Storage 251 Advantages of Cloud Storage 252 Cloud Provisioning 252 Migrating Software Infrastructure to the Cloud 253 Cloud Provisioning Security Concerns 253 Storage Provisioning 255 Network Configurations 256 Network Optimization 259 Cloud Storage Technology 260 Data Replication 261 Amazon Elastic Block Store (EBS) 262 Amazon Simple Storage Service (S3) 264 OpenStack Swift 266 Hadoop Distributed File System (HDFS) 266 Choosing from among These Technologies 277 Cloud Storage Gateway 278 Cloud Security and Privacy 280 Security, Privacy, and Attack Surface Area 280 Legal Issues (Jurisdiction and Data) 282 Supplier Lifetime (Vendor Lock-In) 283 Summary 284 Chapter Essentials 284 Chapter 10 Testing and Deployment: Quality Is King 287 Overview of Deployment Models 288 Private Cloud 288 Community Cloud 289 Public Cloud 289 Hybrid Cloud 290 Cloud Management Strategies 290 Private Cloud Strategies 291 Community Cloud Strategies 291 Public Cloud Strategies 292 Hybrid Cloud Strategies 292 Management Tools 293 Cloud Architecture 294 The Need for Cloud Architectures 294 Technical Benefits 295 Business Benefits 295 Cloud Deployment Options 296 Environment Provisioning 296 Deploying a Service to the Cloud 298 Deployment Testing and Monitoring 301 Creating and Deploying Cloud Services 304 Creating and Deploying a Cloud Service Using Windows Azure 305 Deploying and Managing a Scalable Web Service with Flume on Amazon EC2 309 Summary 321 Chapter Essentials 322 Chapter 11 Cloud Computing Standards and Security 323 Cloud Computing Standards 324 Why Do Standards Matter? 324 Current Ad Hoc Standards 325 Security Concepts and Tools 326 Security Threats and Attacks 326 Obfuscation 329 Access Control List 329 Virtual Private Network 330 Firewalls 330 Demilitarized Zone 333 Encryption Techniques 334 Public Key Infrastructure 335 Internet Protocol Security 336 Secure Sockets Layer/Transport Layer Security 336 Ciphers 337 Access Control Methods 338 Role-Based Access Control 338 Mandatory Access Control 338 Discretionary Access Control 339 Rule-Based Access Controls 339 Multifactor Authentication 339 Single Sign-On 339 Federation 340 Implementing Guest and Host Hardening Techniques 340 Disabling Unneeded Ports and Services 340 Secure User Credentials 343 Antivirus Software 344 Software Security Patching 344 Summary 345 Chapter Essentials 345 Chapter 12 The Cloud Makes It Rain Money: The Business in Cloud Computing 347 The Nature of Cloud Business 348 The Service Nature of the Cloud 348 Making Money with Open-Source Software 349 White Label Branding 350 Cloud Service Business Models 351 Infrastructure as a Service (IaaS) 351 Platform as a Service (PaaS) 352 Software as a Service (SaaS) 353 Data as a Service (DaaS) 354 Communication as a Service (CaaS) 355 Monitoring as a Service (MaaS) 355 Business Process as a Service (BPaaS) 355 Anything as a Service (XaaS) 356 Service Model Accountability and Responsibility 356 The Enterprise Cloud 359 Enterprise Applications 359 Cloud Collaboration 360 Collaborating with Telepresence 361 Disaster Recovery 364 Preparing for Failure: Disaster Recovery Plan 365 Backup Sites and Geographical Diversity 366 Change-Over Mechanism: Failover and Failback 369 Business Continuity and Cloud Computing 369 Business Continuity in the Cloud 370 Workshifting in the Cloud 371 Bring Your Own Device 371 Summary 372 Chapter Essentials 373 Chapter 13 Planning for Cloud Integration: Pitfalls and Advantages 375 Work Optimization 376 Optimizing Usage, Capacity, and Cost 376 Which Service Model Is Best for You? 379 The Right Cloud Model 381 Private Cloud 381 Public Cloud 383 Hybrid Cloud 384 Adapting Organizational Culture for the Cloud 385 Finding Out the Current Culture 385 Mapping Out an Adaption Plan 386 Culture Adaption, Propagation, and Maintenance 387 Potholes on the Cloud Road 389 Roadblocks to Planning 389 Convincing the Board 391 Summary 394 Chapter Essentials 394 Appendix The CompTIA Cloud+ Certification Exam 397 Preparing for the Exam 398 Taking the Exam 399 Reviewing the Exam Objectives 400 Index 417
£35.62
John Wiley & Sons Inc VMware Certified Professional Data Center
Book SynopsisMaster vSphere 6 virtualization with hands-on practice and bonus preview exams VCP6-DCV: VMware Certified Professional-Data Center Virtualization on vSphere 6 Study Guide is your ultimate guide to preparing for exam 2VO-621. This Study Guide provides 100% coverage of all exam objectives and offers a unique set of study tools including assessment tests, objective map, real-world scenarios, hands-on exercises, and much more so you can be confident come exam day. You will also receive access to the superior Sybex interactive online learning environment that provides additional study tools including electronic flashcards and bonus practice exams. More than just a study guide, this book bridges the gap between exam prep and real-world on the job skills by focusing on the key information VMware professionals need to do the job. You''ll master the vCenter Server and ESXi from planning and installation through upgrade and security, and develop an in-depth understanding of vSphTable of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 What’s New in vSphere 6.7 1 Accessing vSphere 2 VMware vSphere Client 2 Application Programming Interface 8 Topology and UI Updates for VCSA 8 External Platform Services Controller 8 Update Manager 10 Storage Updates 18 Persistent Memory 19 Remote Direct Memory Access 19 vSAN 20 Security Updates 22 Virtual Machines 24 Content Library 24 Per-VM EVC 40 Summary 41 Exam Essentials 42 Review Questions 43 Chapter 2 Configuring and Administering Security in a vSphere Datacenter 47 Configuring and Administering Role-Based Access Controls 49 What Is a Privilege? 49 What Is a Task? 49 What Is a Role? 50 Assigning Permissions 54 Viewing and Exporting Group and User Permissions 70 Securing ESXi Hosts and the vCenter Server 72 Hardening ESXi Hosts 72 Hardening vCenter Server 87 Configuring and Enabling SSO and Identity Sources 88 vCenter Single Sign-On 89 Platform Services Controller 91 Configuring vCenter Single Sign-On 93 Securing Virtual Machines 96 Secure Boot 96 Virtual Machine Encryption 96 Virtual Machine Hardening 106 vSphere Network Security 117 Summary 118 Exam Essentials 118 Review Questions 119 Chapter 3 Networking in vSphere 123 Understanding vSphere Networking 124 Standard Switches 125 Virtual Distributed Switches 127 Using dvPort Groups 138 Working with Virtual Adapters 144 Custom TCP/IP Stacks 147 Long-Distance vMotion 151 Migrating Virtual Machines to or from a vDS 151 Performance and Reliability 151 Link Aggregation 152 Load Balancing and Failover Policies 153 Traffic Shaping 154 TCP Segmentation Offload 155 Jumbo Frames 155 Network Isolation 158 Automatic Rollback 159 Monitoring and Mirroring 163 Using NetFlow 164 Understanding Network I/O Control 165 Configuring NIOC Reservations, Shares, and Limits 166 Summary 170 Exam Essentials 171 Review Questions 172 Chapter 4 Storage in vSphere 177 Managing vSphere Integration with Physical Storage 178 Adding an NFS Datastore 179 Using Block Storage 186 Configuring the Software iSCSI Initiator 187 Binding VMkernels to the Software iSCSI Initiator 189 Scanning for Changes 192 Storage Filters 193 Thin Provisioning 194 Storage Multipathing and Failover 196 Configuring and Upgrading VMFS and NFS 203 Configuring VMFS Datastores 207 Raw Device Mapping and Bus Sharing 214 Configuring Software-Defined Storage 217 Virtual Storage Area Network 217 Virtual Volumes 225 Storage Policy–Based Management 229 Enabling and Configuring Storage I/O Control 230 Summary 233 Exam Essentials 234 Review Questions 235 Chapter 5 Upgrading a vSphere Deployment 239 Upgrading from vSphere 5.5 240 Upgrading a vCenter Server on Windows 244 Verify Basic Compatibility and Download the Installer 245 Prepare the Database for Upgrade 245 Prepare for Upgrading the Content Library 247 Verify Network Prerequisites, Load Balancer, and ESXI Hosts 247 Starting the vCenter on Windows Upgrade 247 Migrating to the vCenter Server Appliance 252 Upgrading Using the Command Line 252 Upgrading Using the Graphical Interface 253 Upgrading ESXi Hosts and Virtual Machines 264 Using the Update Manager Download Service 264 Using vSphere Update Manager 265 Summary 284 Exam Essentials 285 Review Questions 286 Chapter 6 Allocating Resources in a vSphere Datacenter 291 Administering and Managing vSphere 6.x Resources 293 Configuring Multilevel Resource Pools 295 Reservations, Limits, and Shares 296 Resource Pool Administration Exercises 303 Using Tags and Custom Attributes 308 Configuring vSphere DRS and Storage DRS Clusters 315 Distributed Resource Scheduler 316 Predictive DRS 318 Network-Aware DRS 320 Storage DRS 322 Establishing Affinity and Anti-Affinity 322 DRS Cluster Administration Exercises 324 Summary 342 Exam Essentials 343 Review Questions 344 Chapter 7 Backing Up and Recovering a vSphere Deployment 349 VCSA Backup and Restore 350 Backing Up Virtual Machines by Using VDP 357 Installing VDP 358 Creating Backup Jobs 361 Restoring from Backup 365 Deploying Proxy Servers 368 Replicating Virtual Machines 376 Deploying a Replication Appliance 376 Configuring Replication 378 Recovering Replicated VMs 382 Summary 387 Exam Essentials 387 Review Questions 388 Chapter 8 Troubleshooting a vSphere Deployment 393 Troubleshooting vCenter and ESXi 394 vCenter Connectivity and Services 394 vCenter Certificates 399 vCenter Log Files 399 ESXi Troubleshooting 403 ESXi Monitoring 407 Troubleshooting Storage and Networking 413 Storage Issues 413 Storage Performance 416 Storage DRS and I/O Control 417 Network Issues 418 Troubleshooting Upgrades 421 Troubleshooting Virtual Machines 421 Troubleshooting HA and DRS 425 Summary 426 Exam Essentials 427 Review Questions 428 Chapter 9 Deploying and Customizing ESXi Hosts 433 Configuring Auto Deploy 434 Enabling PXE Boot 435 Configuring DHCP 435 Configuring TFTP 436 Enabling Auto Deploy 437 Adding Deploy Rules 440 Adding a Custom Image and Profile 442 Stateless Caching and Stateful Installs 442 Employing Host Profiles 452 Creating and Using Host Profiles 453 Importing and Exporting Host Profiles 457 Advanced Profile Modifications 458 Using Answer Files 461 Summary 468 Exam Essentials 468 Review Questions 469 Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA 475 Configuring vSphere Cluster High Availability 476 HA Failures and Responses 477 Host Isolation 478 Heartbeat Datastores 479 Advanced Options 480 Configuring VMCP 482 Monitoring Virtual Machines 483 Admission Control 486 vCenter Server Appliance High Availability 499 Summary 511 Exam Essentials 512 Review Questions 514 Chapter 11 Administering and Managing vSphere Virtual Machines 519 Virtual Machine Advanced Settings 520 Virtual Machine Configuration File 522 Advanced Virtual Machine Options 528 Content Library 537 VMware Converter 546 Summary 558 Exam Essentials 558 Review Questions 559 Appendix Answers to Review Questions 565 Chapter 1: What’s New in vSphere 6.7 566 Chapter 2: Configuring and Administering Security in a vSphere Datacenter 567 Chapter 3: Networking in vSphere 569 Chapter 4: Storage in vSphere 570 Chapter 5: Upgrading a vSphere Deployment 571 Chapter 6: Allocating Resources in a vSphere Datacenter 573 Chapter 7: Backing Up and Recovering a vSphere Deployment 575 Chapter 8: Troubleshooting a vSphere Deployment 577 Chapter 9: Deploying and Customizing ESXi Hosts 578 Chapter 10: Ensuring High Availability for vSphere Clusters and the VCSA 579 Chapter 11: Administering and Managing vSphere Virtual Machines 581 Index 583
£38.00
John Wiley & Sons Inc The Cloud Adoption Playbook
Book SynopsisThe essential roadmaps for enterprise cloud adoption As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization. This book will help you: Discover how the cloud can fulfill major business needsAdopt a standardized Cloud Adoption Framework and understand the key dimensTable of ContentsForeword xxi Introduction xxiii 1 Business Drivers 1 Addressing Challenges for the Enterprise 1 What Drives a Business to the Cloud? 3 What Do You Gain from Cloud? 5 Implications to the Enterprise 7 Summary 9 2 Framework Overview 11 The Framework 13 Key dimensions of cloud adoption 15 Steps in the adoption journey 16 Ten Key Actions of the Framework 17 1. Involve the right people 17 2. Achieve business and technology alignment 18 3. Take a holistic approach across dimensions 19 4. Assume an outside-in, client-centered approach 20 5. Open the aperture to new possibilities 20 6. Show progress and quick wins 21 7. Collaborate actively 23 8. Balance sustained and disruptive innovation 23 9. Establish success criteria 24 10. Account for a multicloud hybrid model 24 Summary 25 3 Strategy 27 What Does a Cloud Strategy Mean for the CIO? 28 What Do We Really Mean by “Strategy”? 28 Developing a Cloud Strategy 30 What Are the Complete Dimensions of a Cloud Strategy? 31 What Key Considerations Should a Cloud Strategy Address? 34 Service types 35 Deployment models 36 Roles 37 Controls 39 Vendor relationships 41 What Prescriptive Steps Are Required to Develop a Cloud Strategy? 44 Step 1: Define business objectives and constraints 44 Step 2: Complete analysis of your workload portfolio 46 Step 3: Envision your future state and analyze your current state 48 Step 4: Assess your organization’s readiness 50 Step 5: Build an execution framework with defined strategic milestones 52 Step 6: Define proven approaches best suited to your organization 53 Summary 55 4 Culture and Organization 57 What Does the Cloud Mean for Human Resources? 57 What Do We Really Mean by “Culture”? 58 What cultural elements make cloud adoption easier or harder? 59 Talent and flexibility 69 Basic Squad Organization 71 SRE model and squads 73 Tribes and guilds 74 Cultural elements of the squad model 75 Advantages of a COC 77 What are the goals of a COC? 78 Life cycle of a COC 78 When a COC is not the right approach 79 Summary 81 5 Architecture and Technology 83 What Does Cloud Adoption Mean for Enterprise Architects? 83 Role of Enterprise Architects in Cloud Adoption 85 Workload assessment 85 Reference architectures 90 Example Microservices Reference Architecture 94 Style introduction 94 An example reference architecture 95 Reference Implementations 100 DevOps implementation 103 Resiliency patterns 104 Security 104 Management 105 Summary 105 6 Security and Compliance 107 What Does the Cloud Mean to the CISO? 107 Will My People, Processes, Tools, and Approaches Change? 108 How Is Cloud Adoption Affected by Compliance Issues? 111 How Do I Protect Against Data Breaches and Loss? 113 Key management 113 Certificate management 114 Data integrity 115 How Do I Protect Against Networking Vulnerabilities? 116 Cloud-hosted firewalls 116 Intrusion prevention systems 117 Distributed denial of service 117 Microsegmentation 118 What Does a Secure Cloud-Native System Look Like? 118 Identity and Access Management for Applications 120 Authentication 120 Multifactor authentication 121 Directory services 121 Reporting 121 Implementing identity and access for cloud-native applications 122 Secure DevOps 123 Dynamic analysis 124 Static analysis 124 How Do I Get Visibility to My Cloud Applications? 125 Summary 125 7 Emerging Innovation Spaces 127 Innovation as a Business Driver 127 Examples of Innovation 128 Data and analytics 128 Blockchain 130 Containers 132 IoT 134 Cognitive 135 Summary 136 8 Methodology 137 What Does the Cloud Mean for the VP of the VP of Method & and Tools? 137 Introducing the IBM Cloud Garage Method 138 Culture 139 Think 139 Code 140 Deliver 140 Run 141 Manage 141 Learn 142 Connections between Cloud and Agile 142 Lean Startup and Lean Development 144 Why Design Thinking Is the Missing Link 145 Starting a Project with the IBM Cloud Garage Method 146 Wrapping Up the Workshop 150 Our Approach to Project Inception 150 Starting Development 151 The Role of Technology Choices 154 Expanding to Deliver the MVP 154 The Role of Testing in the Squad Model 156 Customer Example 156 Summary 158 9 Service Management and Operations 159 What Does Cloud Mean for the VP of Operations? 159 Operational Transformation 160 Organizational changes 161 Process changes 164 Technology changes 165 Cultural changes 169 New Roles 171 Roles and responsibilities 171 Organizational alignment 173 Operational Readiness 178 Operationalizing the cloud 178 Operationalizing application readiness 180 Incident Management 182 Designing resilient applications for the cloud 182 Taking a fresh approach to incident management 183 Event management 184 Runbooks 185 Log management 187 Dashboards 187 Ticketing 188 Root-Cause Analysis and Postmortems 190 Root-cause analysis 190 Postmortem 192 Deployment, Release Management, and Change Management 194 Deployment 194 Release management 197 Change management 198 Configuration Management 199 Configuration items and relationships 200 CMDB/CMS 200 Discovery 201 Summary 202 10 Governance 203 Cloud Challenges 203 Regulatory requirements 204 Sourcing and standardization issues 204 Threats to security and reputation 205 Aspects of a Governance Model 206 Defining a Governance Model 207 Considerations for your governance model 208 Cloud center of competence 209 Chapters and guilds 211 Summary 213 Conclusion 215 Notes 219 Index 223
£17.59