Browse Results

Showing 10,976 through 11,000 of 61,763 results

Cloud Native Spring in Action: With Spring Boot and Kubernetes

by Thomas Vitale

Build and deliver production-grade cloud-native apps with Spring framework and Kubernetes. In Cloud Native Spring in Action you&’ll learn: Cloud native best practices and design patterns Build and test cloud native apps with Spring Boot and Spring Cloud Handle security, resilience, and scalability in imperative and reactive applications Configure, deploy, and observe applications on Kubernetes Continuous delivery and GitOps to streamline your software lifecycle Cloud Native Spring in Action is a practical guide to building applications that are designed for cloud environments. You&’ll learn effective Spring and Kubernetes cloud development techniques that you can immediately apply to enterprise-grade applications. Follow a detailed and complete cloud native system from first concept right through to production and deployment, learning best practices, design patterns, and little-known tips and tricks for pain-free cloud native development. Including coverage of security, continuous delivery, and configuration, this hands-on guide is the perfect primer for navigating the increasingly complex cloud landscape. About the technology Do you want to learn how to build scalable, resilient, and observable Spring applications that take full advantage of the cloud computing model? If so, Cloud Native Spring in Action is the book for you! It will teach you the essential techniques and practices you need to build efficient Spring Boot applications ready for production in the cloud. About the book In Cloud Native Spring in Action, you&’ll learn how to containerize your Spring Boot applications with Cloud Native Buildpacks and deploy them on Kubernetes. This practical guide delivers unique insights into hosting microservices, serverless applications, and other modern architectures on cloud platforms. You&’ll learn how to use Spring-based methodologies, practices, and patterns that you won&’t find anywhere else. What's inside Implement cloud native patterns with Spring Handle security, resilience, and scalability Build and test imperative and reactive applications Configuration and observability on Kubernetes Adopt continuous delivery and GitOps About the reader For intermediate Java developers. About the author Thomas Vitale is a software engineer, open source contributor, and international conference speaker. Table of Contents PART 1 CLOUD NATIVE FUNDAMENTALS 1 Introduction to cloud native 2 Cloud native patterns and technologies PART 2 CLOUD NATIVE DEVELOPMENT 3 Getting started with cloud native development 4 Externalized configuration management 5 Persisting and managing data in the cloud 6 Containerizing Spring Boot 7 Kubernetes fundamentals for Spring Boot PART 3 CLOUD NATIVE DISTRIBUTED SYSTEMS 8 Reactive Spring: Resilience and scalability 9 API gateway and circuit breakers 10 Event-driven applications and functions 11 Security: Authentication and SPA 12 Security: Authorization and auditing

Cloud Native Transformation: Practical Patterns for Innovation

by Pini Reznik Jamie Dobson Michelle Gienow

In the past few years, going cloud native has been a big advantage for many companies. But it’s a tough technique to get right, especially for enterprises with critical legacy systems. This practical hands-on guide examines effective architecture, design, and cultural patterns to help you transform your organization into a cloud native enterprise—whether you’re moving from older architectures or creating new systems from scratch.By following Wealth Grid, a fictional company, you’ll understand the challenges, dilemmas, and considerations that accompany a move to the cloud. Technical managers and architects will learn best practices for taking on a successful company-wide transformation.Cloud migration consultants Pini Reznik, Jamie Dobson, and Michelle Gienow draw patterns from the growing community of expert practitioners and enterprises that have successfully built cloud native systems. You’ll learn what works and what doesn’t when adopting cloud native—including how this transition affects not just your technology but also your organizational structure and processes.You’ll learn:What cloud native means and why enterprises are so interested in itCommon barriers and pitfalls that have affected other companies (and how to avoid them)Context-specific patterns for a successful cloud native transformationHow to implement a safe, evolutionary cloud native approachHow companies addressed root causes and misunderstandings that hindered their progressCase studies from real-world companies that have succeeded with cloud native transformations

Cloud Native programming with Golang: Develop microservice-based high performance web apps for the cloud with Go

by Martin Helmich Mina Andrawos Jelmer Snoeck

Key Features Build well-designed and secure microservices. Enrich your microservices with continous integration and monitoring. Containerize your application with Docker Deploy your application to AWS. Learn how to utilize the powerful AWS services from within your application Book Description Cloud computing and microservices are two very important concepts in modern software architecture. They represent key skills that ambitious software engineers need to acquire in order to design and build software applications capable of performing and scaling. Go is a modern cross-platform programming language that is very powerful yet simple; it is an excellent choice for microservices and cloud applications. Go is gaining more and more popularity, and becoming a very attractive skill.. The book will take you on a journey into the world of microservices and cloud computing with the help of Go. It will start by covering the software architectural patterns of cloud applications, as well as practical concepts regarding how to scale, distribute, and deploy those applications. You will also learn how to build a JavaScript-based front-end for your application, using TypeScript and React. From there, we dive into commercial cloud offerings by covering AWS. Finally, we conclude our book by providing some overviews of other concepts and technologies that the reader can explore to move from where the book leaves off. What you will learn Understand modern software applications architectures Build secure microservices that can effectively communicate with other services Get to know about event-driven architectures by diving into message queues such as Kafka, Rabbitmq, and AWS SQS. Understand key modern database technologies such as MongoDB, and Amazon’s DynamoDB Leverage the power of containers Explore Amazon cloud services fundamentals Know how to utilize the power of the Go language to access key services in the Amazon cloud such as S3, SQS, DynamoDB and more. Build front-end applications using ReactJS with Go Implement CD for modern applications

Cloud Native with Kubernetes

by Alexander Raul

This book is for developers, architects, DevOps engineers, or anyone interested in developing and managing cloud-native applications. Those already running cloud applications and looking for a better way to manage their platform or others interested in a career change given the recent popularity of Kubernetes will also find this book helpful. Some familiarity with cloud computing, containers and DevOps is required, but no prior knowledge of building production applications using Kubernetes is needed to get started with this book.

Cloud Native: Using Containers, Functions, and Data to Build Next-Generation Applications

by Peter Jausovec Boris Scholl Trent Swanson

Developers often struggle when first encountering the cloud. Learning about distributed systems, becoming familiar with technologies such as containers and functions, and knowing how to put everything together can be daunting. With this practical guide, you’ll get up to speed on patterns for building cloud native applications and best practices for common tasks such as messaging, eventing, and DevOps.Authors Boris Scholl, Trent Swanson, and Peter Jausovec describe the architectural building blocks for a modern cloud native application. You’ll learn how to use microservices, containers, serverless computing, storage types, portability, and functions. You’ll also explore the fundamentals of cloud native applications, including how to design, develop, and operate them.Explore the technologies you need to design a cloud native applicationDistinguish between containers and functions, and learn when to use themArchitect applications for data-related requirementsLearn DevOps fundamentals and practices for developing, testing, and operating your applicationsUse tips, techniques, and best practices for building and managing cloud native applicationsUnderstand the costs and trade-offs necessary to make an application portable

Cloud Network Management: An IoT Based Framework

by Sanjay Kumar Biswash and Sourav Kanti Addya

Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users’ expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks, where data is easily accessible and available. This book provides a framework for the next generation of cloud networks, which is the emerging part of 5G partnership projects. This contributed book has following salient features, A cloud-based next generation networking technologies. Cloud-based IoT and mobility management technology. The proposed book is a reference for research scholars and course supplement for cloud-IoT related subjects such as distributed networks in computer/ electrical engineering. Sanjay Kumar Biswash is working as an Assistant professor in NIIT University, India. He held Research Scientist position, Institute of Cybernetics, National Research Tomsk Polytechnic University, Russia. He was PDF at LNCC, Brazil and SDSU, USA. He was a visiting researcher to the UC, Portugal. Sourav Kanti Addya is working as an Assistant professor in NITK, Surathkal, India. He was a PDF at IIT Kharagpur, India. He was a visiting scholar at SDSU, USA. He obtained national level GATE scholarship. He is a member of IEEE, ACM.

Cloud Networking for Big Data (Wireless Networks)

by Song Guo Deze Zeng Lin Gu

This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also presented, as well as software defined networking (SDN) and network function virtualization (NFV) technologies as key cloud networking technologies. The authors illustrate that SDN and NFV can be applied to benefit the big data processing by proposing a cloud networking framework. Based on the framework, two case studies examine how to improve the cost efficiency of big data processing. Cloud Networking for Big Data targets professionals and researchers working in big data, networks, wireless communications and information technology. Advanced-level students studying computer science and electrical engineering will also find this book valuable as a study guide.

Cloud Observability in Action (In Action)

by Michael Hausenblas

Don&’t fly blind. Observability gives you actionable insights into your cloud native systems—from pinpointing errors, to increasing developer productivity, to tracking compliance.Observability is the difference between an error message and an error explanation with a recipe how to resolve the error! You know exactly which service is affected, who&’s responsible for its repair, and even how it can be optimized in the future. Cloud Observability in Action teaches you how to set up an observability system that learns from a cloud application&’s signals, logging, and monitoring, all using free and open source tools. In Cloud Observability in Action you will learn how to: Apply observability in cloud native systems Understand observability signals, including their costs and benefits Apply good practices around instrumentation and signal collection Deliver dashboarding, alerting, and SLOs/SLIs at scale Choose the correct signal types for given roles or tasks Pick the right observability tool for any given function Communicate the benefits of observability to management A well-designed observability system provides insight into bugs and performance issues in cloud native applications. They help your development team understand the impact of code changes, measure optimizations, and track user experience. Best of all, observability can even automate your error handling so that machine users apply their own fixes—no more 3AM calls for emergency outages. About the technology Cloud native systems are made up of hundreds of moving parts. When something goes wrong, it&’s not enough to know there is a problem—you need to know where it is, what it is, and how to fix it. This book takes you beyond traditional monitoring, explaining observability systems that turn application telemetry into actionable insights. About the book Cloud Observability in Action gives you the background and techniques you need to successfully introduce observability into cloud-based serverless and Kubernetes environments. In it, you&’ll learn to use open standards and tools like OpenTelemetry, Prometheus, and Grafana to build your own observability system and end reliance on proprietary software. You&’ll discover insights from different telemetry signals, including logs, metrics, traces, and profiles. Plus, the book&’s rigorous cost-benefit analysis ensures you&’re getting a real return on your observability investment. What's inside Observability in and of cloud native systems Dashboarding, alerting, and SLOs/SLIs at scale Signal types for any role or task State-of-the-art open source observability tools About the reader For application developers, platform owners, DevOps, and SREs. About the author Michael Hausenblas is a Product Owner in the AWS open source observability team. Table of Contents 1 End-to-end observability 2 Signal types 3 Sources 4 Agents and instrumentation 5 Backend destinations 6 Frontend destinations 7 Cloud operations 8 Distributed tracing 9 Developer observability 10 Service level objectives 11 Signal correlation

Cloud Portability and Interoperability: Issues and Current Trends (SpringerBriefs in Computer Science)

by Antonio Esposito Beniamino Di Martino Giuseppina Cretella

This book offers readers a quick, comprehensive and up-to-date overview of the most important methodologies, technologies, APIs and standards related to the portability and interoperability of cloud applications and services, illustrated by a number of use cases representing a variety of interoperability and portability scenarios. The lack of portability and interoperability between cloud platforms at different service levels is the main issue affecting cloud-based services today. The brokering, negotiation, management, monitoring and reconfiguration of cloud resources are challenging tasks for developers and users of cloud applications due to the different business models associated with resource consumption, and to the variety of services and features offered by different cloud providers. In chapter 1 the concepts of cloud portability and interoperability are introduced, together with the issues and limitations arising when such features are lacking or ignored. Subsequently, chapter 2 provides an overview of the state-of-the-art methodologies and technologies that are currently used or being explored to enable cloud portability and interoperability. Chapter 3 illustrates the main cross-platform cloud APIs and how they can solve interoperability and portability issues. In turn, chapter 4 presents a set of ready-to-use solutions which, either because of their broad-scale use in cloud computing scenarios or because they utilize established or emerging standards, play a fundamental part in providing interoperable and portable solutions. Lastly, chapter 5 presents an overview of emerging standards for cloud Interoperability and portability. Researchers and developers of cloud-based services will find here a brief survey of the relevant methodologies, APIs and standards, illustrated by case studies and complemented by an extensive reference list for more detailed descriptions of every topic covered.

Cloud Radio Access Networks

by Tony Q. S. Quek Wei Yu Mugen Peng Osvaldo Simeone

This unique text will enable readers to understand the fundamental theory, current techniques, and potential applications of Cloud Radio Access Networks (C-RANs). Leading experts from academia and industry provide a guide to all of the key elements of C-RANs, including system architecture, performance analysis, technologies in both physical and medium access control layers, self-organizing and green networking, standards development, and standardization perspectives. Recent developments in the field are covered, as well as open research challenges and possible future directions. The first book to focus exclusively on Cloud Radio Access Networks, this is essential reading for engineers in academia and industry working on future wireless networks.

Cloud Reliability Engineering: Technologies and Tools

by Pethuru Raj Rathnakar Achary

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book’s chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Cloud Scale Analytics with Azure Data Services: Build modern data warehouses on Microsoft Azure

by Patrik Borosch

A practical guide to implementing a scalable and fast state-of-the-art analytical data estateKey FeaturesStore and analyze data with enterprise-grade security and auditingPerform batch, streaming, and interactive analytics to optimize your big data solutions with easeDevelop and run parallel data processing programs using real-world enterprise scenariosBook DescriptionAzure Data Lake, the modern data warehouse architecture, and related data services on Azure enable organizations to build their own customized analytical platform to fit any analytical requirements in terms of volume, speed, and quality. This book is your guide to learning all the features and capabilities of Azure data services for storing, processing, and analyzing data (structured, unstructured, and semi-structured) of any size. You will explore key techniques for ingesting and storing data and perform batch, streaming, and interactive analytics. The book also shows you how to overcome various challenges and complexities relating to productivity and scaling. Next, you will be able to develop and run massive data workloads to perform different actions. Using a cloud-based big data-modern data warehouse-analytics setup, you will also be able to build secure, scalable data estates for enterprises. Finally, you will not only learn how to develop a data warehouse but also understand how to create enterprise-grade security and auditing big data programs. By the end of this Azure book, you will have learned how to develop a powerful and efficient analytical platform to meet enterprise needs.What you will learnImplement data governance with Azure servicesUse integrated monitoring in the Azure Portal and integrate Azure Data Lake Storage into the Azure MonitorExplore the serverless feature for ad-hoc data discovery, logical data warehousing, and data wranglingImplement networking with Synapse Analytics and Spark poolsCreate and run Spark jobs with Databricks clustersImplement streaming using Azure Functions, a serverless runtime environment on AzureExplore the predefined ML services in Azure and use them in your appWho this book is forThis book is for data architects, ETL developers, or anyone who wants to get well-versed with Azure data services to implement an analytical data estate for their enterprise. The book will also appeal to data scientists and data analysts who want to explore all the capabilities of Azure data services, which can be used to store, process, and analyze any kind of data. A beginner-level understanding of data analysis and streaming will be required.

Cloud Security

by Russell Dean Vines Ronald L. Krutz

Well-known security experts decipher the most challenging aspect of cloud computing-securityCloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support.As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing.Coverage Includes:Cloud Computing FundamentalsCloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks IssuesCloud Computing Security Challenges Cloud Computing Security ArchitectureCloud Computing Life Cycle IssuesUseful Next Steps and Approaches

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

by Prashant Priyam

Secure public and private cloud workloads with this comprehensive learning guide.Key Features Take your cloud security functions to the next level by automation Learn to automate your security functions on AWS and OpenStack Practical approach towards securing your workloads efficientlyBook DescriptionSecurity issues are still a major concern forall IT organizations. For many enterprises,the move to cloud computing has raisedconcerns for security, but when applicationsare architected with focus on security,cloud platforms can be made just as secureas on-premises platforms. Cloud instancescan be kept secure by employing securityautomation that helps make your data meetyour organization's security policy.This book starts with the basics of whycloud security is important and howautomation can be the most effective wayof controlling cloud security. You willthen delve deeper into the AWS cloudenvironment and its security servicesby dealing with security functions suchas Identity and Access Managementand will also learn how these servicescan be automated. Moving forward,you will come across aspects suchas cloud storage and data security, automatingcloud deployments, and so on. Then,you'll work with OpenStack security modulesand learn how private cloud securityfunctions can be automated for bettertime- and cost-effectiveness. Toward the endof the book, you will gain an understandingof the security compliance requirementsfor your Cloud.By the end of this book, you will havehands-on experience of automating yourcloud security and governance.What you will learn Define security for public and privatecloud services Address the security concerns ofyour cloud Understand Identity and AccessManagement Get acquainted with cloud storageand network security Improve and optimize publicand private cloud security Automate cloud security Understand the security compliancerequirements of your cloudWho this book is forThis book is targeted at DevOps Engineers, Security professionals, or any stakeholders responsible for securing cloud workloads. Prior experience with AWS or OpenStack will be an advantage.

Cloud Security For Dummies

by Ted Coombs

Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you’ll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.

Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP

by Eyal Estrin

A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilitiesKey FeaturesDiscover practical techniques for implementing cloud securityLearn how to secure your data and core cloud infrastructure to suit your business needsImplement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloudBook DescriptionSecuring resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds.This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. As you make progress, you'll implement security in small-scale cloud environments through to production-ready large-scale environments, including hybrid clouds and multi-cloud environments. This book not only focuses on cloud services in general, but it also provides actual examples for using AWS, Azure, and GCP built-in services and capabilities.By the end of this cloud security book, you'll have gained a solid understanding of how to implement security in cloud environments effectively.What you will learnSecure compute, storage, and networking services in the cloudGet to grips with identity management in the cloudAudit and monitor cloud services from a security point of viewIdentify common threats and implement encryption solutions in cloud servicesMaintain security and compliance in the cloudImplement security in hybrid and multi-cloud environmentsDesign and maintain security in a large-scale cloud environmentWho this book is forThis book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. Cloud engineers, cloud architects, or cloud security professionals maintaining production environments in the cloud will also benefit from this book. Prior experience of deploying virtual machines, using storage services, and networking will help you to get the most out of this book.

Cloud Security and Governance

by Sumner Blount Rob Zanella

The rise of Cloud Computing, with services delivered in the cloudA", offers businesses incredible power and flexibility. It promises the efficient use of human and financial capital resources, reducing infrastructure and operation costs. It proposes a model of computing that is effective at meeting the demands of business in a rapidly changing environment. Security and Compliance Issues One of the most difficult challenges related to Cloud Computing, revolves around the security and compliance issues associated with it. This is a major concern and will continue to be so, with the ever increasing onslaught of regulations impacting security controls. This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed. Read this pocket guide and - Learn what Cloud Computing is - This guide provides a definition of Cloud Computing, before proceeding through essential characteristics that comprise it. Cloud deployment methods and the benefits of Cloud Computing are then discussed. Understand Cloud security and privacy issues - Security and compliance are two of the primary inhibitors in Cloud adoption. This pocket guide highlights the security and privacy considerations to keep in mind when planning your Cloud strategy. Be aware of the key compliance challenges - Cloud compliance has several important challenges that do not relate specifically to security. This guide details some of the key compliance challenges that you will need to address, including multinational considerations, business continuity and disaster recovery, legal issues and specific regulatory requirements. The areas of security and compliance often represent the biggest inhibitors to adoption of Cloud Computing, and because the potential impacts of problems in these areas are so profound, it is essential that you carefully identify your requirements in these areas, perform extensive due diligence, and work with your provider to develop and monitor processes that will help you both succeed. Ensure Successful Cloud Deployment - Buy this essential guide to Cloud Security and Compliance today!

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)

by Tim Mather Subra Kumaraswamy Shahed Latif

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availabilityLearn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud servicesDiscover which security management frameworks and standards are relevant for the cloudUnderstand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing modelsLearn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to considerExamine security delivered as a service-a different facet of cloud security

Cloud Security: Attacks, Techniques, Tools, and Challenges

by Preeti Mishra Emmanuel S Pilli R C Joshi

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.

Cloud Security: Concepts, Applications and Perspectives (Cyber Ecosystem and Security)

by Brij B Gupta

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them.Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Cloud Security: Concepts, Applications and Practices

by K. G. Srinivasa G. M. Siddesh Jamuna S. Murthy

This comprehensive work surveys the challenges, the best practices in the industry, and the latest developments and technologies. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security, including risk management, threat analysis, data protection, identity and access management, and compliance. Cloud Security explores the latest security technologies, such as encryption, multi‑factor authentication, and intrusion detection and prevention systems, and their roles in securing the cloud environment.Features: Introduces a user-centric measure of cyber security and provides a comparative study on different methodologies used for cyber security Offers real-world case studies and hands-on exercises to give a practical understanding of cloud security Includes the legal and ethical issues, including the impact of international regulations on cloud security Covers fully automated run-time security and vulnerability management Discusses related concepts to provide context, such as Cyber Crime, Password Authentication, Smart Phone Security with examples This book is aimed at postgraduate students, professionals, and academic researchers working in the fields of computer science and cloud computing.

Cloud Surfing: A New Way to Think About Risk, Innovation, Scale and Success

by Thomas M. Koulopoulos

When people hear "the Cloud," they think of cloud computing and salesforce.com, just a sliver of what the Cloud is today. The Cloud has grown: it represents the consummate disruptor to structure; a pervasive social and economic network that will soon connect and define more of the world than any other political, social, or economic organization. The Cloud is the first megatrend of the twenty-first century, one that will shape the way we will address virtually every challenge we face for at least the next 100 years. It is where we will all live, work, and play in the coming decades. The Cloud is where your kids go to dive into online play. It's where you meet and make friends in social networks. It's where companies find the next big idea. It's where political campaigns are won and lost. Cloud Surfing is the groundbreaking book that will explain how to access the full value of the Cloud and how to embrace its possibilities.

Cloud Systems in Supply Chains

by Alan Brown Mark Thompson Jerry Fishenden

Cloud Systems in Supply Chains explores the risks that could face supply chain firms if their implementation of cloud systems is not carefully managed or if not appropriately selected and supported. This volume aids supply chain firms in ensuring that their cloud system activities are positioned to assist and sustain their competitive advantages.

Cloud Technologies and Services: Theoretical Concepts and Practical Applications (Textbooks in Telecommunication Engineering)

by M. Scott Kingsley

This textbook provides a thorough yet compact review of cloud technologies. It offers easy to understand explanations of the technical concepts underlying cloud services, platforms, and applications offered by Amazon Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP). It presents cloud concepts at a depth that can be understood and applied by both technical and non-technical readers. Once that is accomplished the learner can then easily move toward more advanced topics. Or, they can use the knowledge gained from this book to obtain industry certifications and be competitive in this exciting industry. Reader learning is enhanced with quizzes and exam questions and hands-on labs throughout the book with PowerPoint slides, instructor guide and additional labs online. All the tools needed for advancement to the level of cloud architect are found in this book. The author has verified the success of this approach in his own academic environment with much success. He teaches Cloud Engineering and Advanced Cloud Engineering at Southern Methodist University. Both courses were developed in partnership with the AWS Academy, the education arm of the Amazon Web Services cloud platform. Using this methodology his students routinely take and pass cloud certification exams and obtain lucrative employment positions in the rapidly expanding cloud industry.

Cloud Technologies: An Overview of Cloud Computing Technologies for Managers

by Roger McHaney

Contains a variety of cloud computing technologies and explores how the cloud can enhance business operations Cloud Technologies offers an accessible guide to cloud-based systems and clearly explains how these technologies have changed the way organizations approach and implement their computing infrastructure. The author—a noted expert on the topic—includes an overview of cloud computing and addresses business-related considerations such as service level agreements, elasticity, security, audits, and practical implementation issues. In addition, the book covers important topics such as automation, infrastructure as code, DevOps, orchestration, and edge computing. Cloud computing fundamentally changes the way organizations think about and implement IT infrastructure. Any manager without a firm grasp of basic cloud concepts is at a huge disadvantage in the modern world. Written for all levels of managers working in IT and other areas, the book explores cost savings and enhanced capabilities, as well as identifies different models for implementing cloud technologies and tackling cloud business concerns. This important book: Demonstrates a variety of cloud computing technologies and ways the cloud can enhance business operations Addresses data security concerns in cloud computing relevant to corporate data owners Shows ways the cloud can save money for a business Offers a companion website hosting PowerPoint slides Written for managers in the fields of business, IT and cloud computing, Cloud Technologies describes cloud computing concepts and related strategies and operations in accessible language.

Refine Search

Showing 10,976 through 11,000 of 61,763 results