Cloud computing: implementation, management, and security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2010
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXXVIII, 301 S. Ill. |
ISBN: | 9781439806807 1439806802 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035678512 | ||
003 | DE-604 | ||
005 | 20100521 | ||
007 | t | ||
008 | 090814s2010 a||| |||| 00||| eng d | ||
020 | |a 9781439806807 |9 978-1-4398-0680-7 | ||
020 | |a 1439806802 |9 1-4398-0680-2 | ||
035 | |a (OCoLC)698958587 | ||
035 | |a (DE-599)BVBBV035678512 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-703 |a DE-29T |a DE-473 |a DE-91G |a DE-355 | ||
050 | 0 | |a TK5105.88813 | |
082 | 0 | |a 006.7/8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 252 |0 (DE-625)143627: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Rittinghouse, John W. |e Verfasser |0 (DE-588)139148264 |4 aut | |
245 | 1 | 0 | |a Cloud computing |b implementation, management, and security |c John W. Rittinghouse ; James F. Ransome |
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2010 | |
300 | |a XXXVIII, 301 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Web services | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Web services | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ransome, James F. |e Sonstige |0 (DE-588)139148442 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017732817&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017732817 |
Datensatz im Suchindex
_version_ | 1804139384954421249 |
---|---|
adam_text | Contents
Foreword
xiii
Preface
xix
Introduction
xxv
What Is the Cloud?
xxvi
The Emergence of Cloud Computing
xxvi
The Global Nature of the Cloud
xxvii
Cloud-Based Service Offerings
xxviii
Grid Computing or Cloud Computing?
xxxi
Is the Cloud Model Reliable?
xxxi
Benefits of Using a Cloud Model
xxxii
What About Legal Issues When Using
Cloud Models?
xxxii
What Are the Key Characteristics of
Cloud Computing?
xxxiv
Challenges for the Cloud
xxxvi
Chapter
1
The Evolution of Cloud Computing
1
1.1
Chapter Overview
1
1.2
Hardware Evolution
2
1.2.1
First-Generation Computers
3
1.2.2
Second-Generation Computers
4
1.2.3
Third-Generation Computers
5
1.2.4
Fourth-Generation Computers
6
1.3
Internet Software Evolution
7
1.3.1
Establishing a Common Protocol for
the Internet
12
1.3.2
Evolution of Ipv6
13
vi
Cloud Computing
1.3.3
Finding a Common Method to
Communicate Using the Internet
Protocol
13
1.3.4
Building a Common Interface to
the Internet
15
1.3.5
The Appearance of Cloud
Formations
—
From One Computer
to a Grid of Many
20
1.4
Server Virtualization
24
1.4.1
Parallel Processing
25
1.4.2
Vector Processing
26
1.4.3
Symmetric Multiprocessing Systems
26
1.4.4
Massively Parallel Processing Systems
27
1.5
Chapter Summary
28
Chapter
2
Web Services Delivered from the Cloud
29
2.1
Chapter Overview
29
2.2
Communication-as-a-Service (CaaS)
30
2.2.1
Advantages of CaaS
31
2.2.2
Fully Integrated, Enterprise-Class
Unified Communications
32
2.3
Infrastructure-as-a-Service (laaS)
34
2.3.1
Modern On-Demand Computing
36
2.3.2
Amazon s Elastic Cloud
37
2.3.3
Amazon EC2 Service Characteristics
38
2.3.4
Mosso
(Rackspace)
■ 42
2.4
Monitoring-as-a-Service (MaaS)
44
2.4.1
Protection Against Internal and
External Threats
45
2.4.2
Delivering Business Value
47
2.4.3
Real-Time Log Monitoring
Enables Compliance
48
2.5
Platform-as-a-Service (PaaS)
48
2.5.1
The Traditional On-Premises Model
49
2.5.2
The New Cloud Model
49
2.5.3
Key Characteristics of PaaS
49
2.6
Software-as-a-Service (SaaS)
50
2.6.1
SaaS Implementation Issues
51
2.6.2
Key Characteristics of SaaS
52
2.6.3
Benefits of the SaaS Model
53
2.7
Chapter Summary
54
Contents
vii
Chapter
3
Building Cloud Networks
57
3.1
Chapter Overview
57
3.2
The Evolution from the MSP Model to Cloud
Computing and Software-as-a-Service
59
3.2.1
From Single-Purpose Architectures
to Multipurpose Architectures
60
3.2.2
Data Center Virtualization
61
3.3
The Cloud Data Center
62
3.4
Collaboration
62
3.4.1
Why Collaboration?
65
3.5
Service-Oriented Architectures as a Step
Toward Cloud Computing
70
3.6
Basic Approach to a Data Center-Based
SOA
72
3.6.1
Planning for Capacity
73
3.6.2
Planning for Availability
73
3.6.3
Planning for
SOA
Security
74
3.7
The Role of Open Source Software in Data Centers
75
3.8
Where Open Source Software Is Used
77
3.8.1
Web Presence
78
3.8.2
Database Tier
81
3.8.3
Application Tier
83
3.8.4
Systems and Network Management Tier
87
3.9
Chapter Summary
101
Chapter
4
Virtualization
Practicum
103
4.1
Chapter Overview
103
4.2
Downloading Sun xVMVirtualBox
104
4.3
Installing Sun xVMVirtualBox
106
4.4
Adding a Guest Operating System to VirtualBox
112
4.5
Downloading FreeDOS as a Guest OS
112
4.6
Downloading the 7-Zip Archive Tool
114
4.7
Adding a Guest OS to Sun xVMVirtualBox
115
4.8
Chapter Summary
127
Chapter
5
Federation, Presence, Identity, and Privacy in
the Cloud
129
5.1
Chapter Overview
129
5.2
Federation in the Cloud
129
5.2.1
Four Levels of Federation
132
viii
Cloud Computing
5.2.2
How Encrypted Federation Differs
from Trusted Federation
134
5.2.3
Federated Services and Applications
134
5.2.4
Protecting and Controlling Federated
Communication
135
5.2.5
The Future of Federation
136
5.3
Presence in the Cloud
136
5.3.1
Presence Protocols
137
5.3.2
Leveraging Presence
138
5.3.3
Presence Enabled
139
5.3.4
The Future of Presence
139
5.3.5
The Interrelation of Identity, Presence,
and Location in the Cloud
140
5.3.6
Federated Identity Management
140
5.3.7
Cloud and SaaS Identity Management
141
5.3.8
Federating Identity
143
5.3.9
Claims-Based Solutions
144
5.3.10
Identity-as-a-Service (laaS)
144
5.3.11
Compliance-as-a-Service (CaaS)
145
5.3.12
The Future of Identity in the Cloud
146
5.4
Privacy and Its Relation to Cloud-Based
Information Systems
147
5.4.1
Privacy Risks and the Cloud
149
5.4.2
Protecting Privacy Information
150
5.4.3
The Future of Privacy in the Cloud
151
5.5
Chapter Summary
152
Chapter
6
Security in the Cloud
153
6.1
Chapter Overview
153
6.2
Cloud Security Challenges
158
6.3
Software-as-a-Service Security
162
6.3.1
Security Management (People)
164
6.3.2
Security Governance
165
6.3.3
Risk Management
165
6.3.4
Risk Assessment
165
6.3.5
Security Portfolio Management
166
6.3.6
Security Awareness
166
6.3.7
Education and Training
167
6.3.8
Policies, Standards, and Guidelines
167
6.3.9
Secure Software Development
Life Cycle (SecSDLC)
168
6.4
6.5
Chapter
7
7.1
7.2
7.3
7.4
7.5
Contents ¡x
6.3.10
Security Monitoring and Incident
Response
169
6.3.11
Third-Party Risk Management
169
6.3.12
Requests for Information and Sales
Support
169
6.3.13
Business Continuity Plan
170
6.3.14
Forensics
170
6.3.15
Security Architecture Design
172
6.3.16
Vulnerability Assessment
173
6.3.17
Password Assurance Testing
173
6.3.18
Logging for Compliance and Security
Investigations
173
6.3.19
Security Images
173
6.3.20
Data Privacy
174
6.3.21
Data Governance
175
6.3.22
Data Security
175
6.3.23
Application Security
176
6.3.24
Virtual Machine Security
177
6.3.25
Identity Access Management
(IAM)
177
6.3.26
Change Management
178
6.3.27
Physical Security
178
6.3.28
Business Continuity and Disaster
Recovery
179
6.3.29
The Business Continuity Plan
180
Is Security-as-a-Service the New MSSP?
181
Chapter Summary
182
union Standards in Cloud Computing
183
Chapter Overview
183
The Open
Cloud Consortium
183
The Distributed Management Task Force
185
7.3.1
Open Virtualization Format
186
Standards
for Application Developers
187
7.4.1
Browsers
(Ajax)
188
7.4.2
Data (XML, JSON)
189
7.4.3
Solution Stacks (LAMP and LAPP)
192
Standards
for Messaging
193
7.5.1
Simple Message Transfer
Protocol (SMTP)
193
7.5.2
Post Office Protocol (POP)
194
χ
Cloud Computing
7.5.3
Internet Messaging Access
Protocol (IMAP)
194
7.5.4
Syndication (Atom, Atom Publishing
Protocol, and RSS)
194
7.5.5
Communications (HTTP, SIMPLE,
and XMPP)
202
7.6
Standards for Security
205
7.6.1
Security (SAML OAuth, OpenID,
SSITTLS)
205
7.7
Chapter Summary
212
Chapter
8
End-User Access to Cloud Computing
213
Chapter
9
8.1
Chapter
Overview
213
8.2
YouTube
214
8.3
YouTube
API Overview
215
8.3.1
Widgets
216
8.3.2
YouTube Player APIs
217
8.3.3
The YouTube Custom Player
218
8.3.4
YouTube Data API
218
8.4
Zimbra
219
8.4.1
Zimbra
Collaboration Suite (ZCS)
221
8.5
Facebook
221
8.5.1
Facebook Development
223
8.6
Zoho
223
8.6.1
Zoho CloudSQL
225
8.7
DimDirr
ι
Collaboration
226
8.8
Chapter
Summary
233
Mobile Internet Devices and the Cloud
235
9.1
Chapter
Overview
235
9.2
What Is
a Smartphone?
236
9.3
Mobile
»
Operating Systems for Smartphones
237
9.3.1
і
Phone
237
9.3.2
Google (Android)
23-7
9.3.3
Blackberry
241
9.3.4
Windows Mobile
241
9.3.5
Ubuntu Mobile Internet Device (MID)
243
9.4
Mobile
Platform Virtualization
251
9.4.1
KVM
253
9.4.2
VMWare
254
9.5
Collaboration Applications for Mobile Platforms
256
Contents
x¡
9.6
Future Trends
257
9.7
Chapter Summary
258
9.8
Closing Comments
258
Appendix A Visualization
Practicum
(Linux)
261
A.1 Overview
261
A.2 Adding a Linux-Based Guest Operating System
toVirtualBox
262
A.3 Downloading OpenSolaris as a Guest
Operating System
263
A.4 Using the 7-Zip Archive Tool
264
A.5 Adding the OpenSolaris Guest OS to Sun
xVMVirtualBox
265
A.6 Summary
281
Appendix
В
Executive Scenario for Cloud Migration
285
Index
297
|
any_adam_object | 1 |
author | Rittinghouse, John W. |
author_GND | (DE-588)139148264 (DE-588)139148442 |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV035678512 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.88813 |
callnumber-search | TK5105.88813 |
callnumber-sort | TK 45105.88813 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 252 |
classification_tum | DAT 250f |
ctrlnum | (OCoLC)698958587 (DE-599)BVBBV035678512 |
dewey-full | 006.7/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.7/8 |
dewey-search | 006.7/8 |
dewey-sort | 16.7 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01691nam a2200445 c 4500</leader><controlfield tag="001">BV035678512</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100521 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090814s2010 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439806807</subfield><subfield code="9">978-1-4398-0680-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439806802</subfield><subfield code="9">1-4398-0680-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698958587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035678512</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.88813</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.7/8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 252</subfield><subfield code="0">(DE-625)143627:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)139148264</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="b">implementation, management, and security</subfield><subfield code="c">John W. Rittinghouse ; James F. Ransome</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXVIII, 301 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)139148442</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017732817&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017732817</subfield></datafield></record></collection> |
id | DE-604.BV035678512 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:43:08Z |
institution | BVB |
isbn | 9781439806807 1439806802 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017732817 |
oclc_num | 698958587 |
open_access_boolean | |
owner | DE-706 DE-703 DE-29T DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-355 DE-BY-UBR |
owner_facet | DE-706 DE-703 DE-29T DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-355 DE-BY-UBR |
physical | XXXVIII, 301 S. Ill. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | CRC Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser (DE-588)139148264 aut Cloud computing implementation, management, and security John W. Rittinghouse ; James F. Ransome Boca Raton, FL CRC Press 2010 XXXVIII, 301 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Web services Cloud computing Cloud Computing (DE-588)7623494-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s DE-604 Ransome, James F. Sonstige (DE-588)139148442 oth Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017732817&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Rittinghouse, John W. Cloud computing implementation, management, and security Web services Cloud computing Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)7623494-0 |
title | Cloud computing implementation, management, and security |
title_auth | Cloud computing implementation, management, and security |
title_exact_search | Cloud computing implementation, management, and security |
title_full | Cloud computing implementation, management, and security John W. Rittinghouse ; James F. Ransome |
title_fullStr | Cloud computing implementation, management, and security John W. Rittinghouse ; James F. Ransome |
title_full_unstemmed | Cloud computing implementation, management, and security John W. Rittinghouse ; James F. Ransome |
title_short | Cloud computing |
title_sort | cloud computing implementation management and security |
title_sub | implementation, management, and security |
topic | Web services Cloud computing Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Web services Cloud computing Cloud Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017732817&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rittinghousejohnw cloudcomputingimplementationmanagementandsecurity AT ransomejamesf cloudcomputingimplementationmanagementandsecurity |