000 | 03856nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-24612-9 | ||
003 | DE-He213 | ||
005 | 20220801213907.0 | ||
007 | cr nn 008mamaa | ||
008 | 190904s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030246129 _9978-3-030-24612-9 |
||
024 | 7 |
_a10.1007/978-3-030-24612-9 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aSehgal, Naresh Kumar. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _935040 |
|
245 | 1 | 0 |
_aCloud Computing with Security _h[electronic resource] : _bConcepts and Practices / _cby Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken. |
250 | _a2nd ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXLIV, 355 p. 206 illus., 190 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Foundations of Cloud Computing -- Cloud Computing Pyramid -- Features of Private and Public Clouds -- Cloud Workload Characterization -- Cloud Management and Monitoring -- Cloud Computing and Information Security -- Migrating to Cloud -- Migrating a Complex Industry to Cloud -- Cost and Billing practices in Cloud -- Analytics in the Cloud -- Additional Security Considerations for Clouds -- Future trends in Cloud Computing -- A Quick Test of your Cloud fundamentals grasp -- Hands-on project to use Cloud Service Provider. | |
520 | _aThis book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices. Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud; Describes for IT managers how to improve their Cloud Computing infrastructures; Includes coverage of security concerns with Cloud operating models; Uses several case studies to illustrate the “why’s and how’s” of migrating to the Cloud. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _935041 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aComputer Communication Networks. _935042 |
700 | 1 |
_aBhatt, Pramod Chandra P. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _935043 |
|
700 | 1 |
_aAcken, John M. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _935044 |
|
710 | 2 |
_aSpringerLink (Online service) _935045 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030246112 |
776 | 0 | 8 |
_iPrinted edition: _z9783030246136 |
776 | 0 | 8 |
_iPrinted edition: _z9783030246143 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-24612-9 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75722 _d75722 |