The Basics of Cloud Computing :Understanding the Fundamentals of Cloud Computing in Theory and Practice

Publication subTitle :Understanding the Fundamentals of Cloud Computing in Theory and Practice

Author: Rountree   Derrick;Castrillo   Ileana  

Publisher: Elsevier Science‎

Publication year: 2013

E-ISBN: 9780124055216

P-ISBN(Paperback): 9780124059320

P-ISBN(Hardback):  9780124059320

Subject: TP393 computer network

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility.

Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic.

This book gives readers a conceptual understanding and a framework for moving forward with cloud computing, as opposed to competing and related titles, which seek to be comprehensive guides to the cloud.

  • Provides a sound understanding of the cloud and how it works
  • Describes both cloud deployment models and cloud services models, so you can make the best decisions for deployment
  • Presents tips for selecting the best cloud services providers

Chapter

Contributed Chapters

Preface

What to Expect From This Book

Intended Audience

Why Is This Information Important?

Structure of the Book

Chapter 1: Introduction to the Cloud

Introduction

What is the Cloud?

Key Cloud Characteristics

On-Demand Self-Service

Broad Network Access

Resource Pooling

Rapid Elasticity

Measured Service

Cloud Deployment Models

Public

Private

Community

Hybrid

Cloud Service Models

Infrastructure as a Service

Platform as a Service

Software as a Service

Cloud Drivers

System Drivers

Agility

Reliability

Scalability and Elasticity

Performance

Ease of Maintenance

Security and Compliance

Business Drivers

Cost

Consumerism

Technology is Catching Up

Virtualization

Application Architecture

Bandwidth Increases

Driver for Cloud Providers

Economies of Scale

Recurring Revenue

Cloud Adoption Inhibitors: What is Holding People Back?

Ambiguity

Concerns Over Maturity

Services aren’t Robust Enough Yet

SLAs

Integration

Data Integration

Application/Service Integration

Security

Ownership of Data

Auditing

Privacy, Legal, and Compliance Issues

Multitenancy

Security

Lack of Customization

Technology Challenges

Scale Out

Corporate Policies

Flexibility

Summary

Chapter 2: Laying the Groundwork

Introduction

Authentication

Identification vs. Verification

Authorization

Advanced Authentication Methods

Multifactor authentication

Risk-based authentication

Identity Providers

Credential Store

Public IdPs

OpenID

Google

Facebook

Microsoft Account

Federated Identity

Microsoft Access Control Services

Computing Concepts

Utility Computing

Commodity Servers

Hardware Virtualization

Hypervisors

Hypervisor Basics

Hypervisor Types

Xen Hypervisor

Hyper-V

vSphere

KVM

Web Development Technologies

HTML

Adobe Flash

SOAP

REST

Java

JavaScript

ASP.Net

PHP

Ruby on Rails

JBOSS

JSON

Summary

Chapter 3: Cloud Deployment Models

Introduction

Public Clouds

Benefits

Availability

Scalability

Accessibility

Cost Savings

Drawbacks

Integration Limitations

Reduced Flexibility

Forced Downtime

Responsibilities

Security Considerations

Data

Compliance

Auditing

Private Clouds

Benefits

Support and Troubleshooting

Maintenance

Monitoring

Drawbacks

Cost

Hardware and Software Compatibility

Expertise Needed

Responsibilities

Security Considerations

Compliance

Data

Auditing

Community Clouds

Benefits

Cost

Multitenancy

Drawbacks

Ownership

Responsibilities

Security Considerations

Data

Compliance

Auditing

Hybrid Clouds

Benefits

Drawbacks

Integration

Security Considerations

Data

Auditing

Summary

Chapter 4: Cloud Service Models

Introduction

Software as a Service

SaaS Characteristics

Customization

Support and Maintenance

Analytics

Integration

Responsibilities

SaaS Drivers

SaaS Challenges

Disparate Location

Multitenancy

Other Security Challenges

SaaS Providers

Outlook.com

Google Drive

Platform as a Service

PaaS Characteristics

Customization

Analytics

Integration

PaaS Responsibilities

PaaS Drivers

PaaS Challenges

Flexibility Challenges

Security Challenges

PaaS Providers

Windows Azure

Infrastructure as a Service

Responsibilities

Drivers

Challenges

Security Challenges

IaaS Providers

Additional Service Models

Database as a Service

Desktop as a Service

Summary

Chapter 5: Making the Decision

Introduction

To Go to the Cloud or Not?

Choosing a Cloud Service Model

User Experience

Security

Compliance

Choosing a Cloud Deployment Model

User Experience

Security

Responsibilities

Choosing a Public Cloud Service Provider

Tips for Choosing a SaaS Provider

Tips for Choosing a PaaS Provider

Tips for Choosing an IaaS Provider

Chapter 6: Evaluating Cloud Security: An Information Security Framework

Evaluating Cloud Security

Existing Work on Cloud Security Guidance or Frameworks

Tools

Checklists for Evaluating Cloud Security

Foundational Security

Business Considerations

Epic Fail

Defense in Depth

Operational Security

Metrics for the Checklists

Summary

Endnotes

Chapter 7: Operating a Cloud

From Architecture to Efficient and Secure Operations

The Scope of Planning

Physical Access, Security, and Ongoing Costs

Logical and Virtual Access

Personnel Security

Training

Categories of Cloud Security Staff

From the Physical Environment to the Logical

Bootstrapping Secure Operations

Efficiency and Cost

Security Operations Activities

Server Builds

Server Updates

Business Continuity, Backup, and Recovery

Epic Fail

Managing Changes in Operational Environments

Release Management

Information About the Infrastructure: Configuration Management

Change Management

Information Security Management

Vulnerability and Penetration Testing

Security Monitoring and Response

Housekeeping

Threat Monitoring

Incident Response

Best Practices

Resilience in Operations

Summary

Endnotes

Index

The users who browse this book also browse