000 06758cam a22008658i 4500
001 on1028553229
003 OCoLC
005 20220711203232.0
006 m o d
007 cr |||||||||||
008 180702s2018 nju ob 001 0 eng
010 _a 2018031768
040 _aDLC
_beng
_erda
_epn
_cDLC
_dN$T
_dDG1
_dCNCGM
_dYDX
_dOCLCF
_dRECBK
_dMERER
_dUAB
_dUPM
_dTEFOD
_dCOO
_dNLE
_dOCLCO
_dEBLCP
_dOCLCQ
_dSNM
019 _a1028954973
_a1029428551
_a1030254826
_a1041508014
020 _a9781119488125
_q(pdf)
020 _a1119488125
020 _a9781119488088
_q(epub)
020 _a1119488087
020 _a9781119488149
020 _a1119488141
020 _a1119487900
020 _a9781119487906
020 _z9781119487906
_q(cloth)
029 1 _aCHNEW
_b001003198
029 1 _aCHVBK
_b516429035
029 1 _aGBVCP
_b1018229485
035 _a(OCoLC)1028553229
_z(OCoLC)1028954973
_z(OCoLC)1029428551
_z(OCoLC)1030254826
_z(OCoLC)1041508014
037 _a8D8110B2-146A-45F0-B45C-3E360F0DFF32
_bOverDrive, Inc.
_nhttp://www.overdrive.com
042 _apcc
050 1 0 _aQA76.9
_b.V5 2018
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
082 0 0 _a004.67/82
_223
049 _aMAIN
245 0 0 _aCloud computing and virtualization /
_cedited by Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee.
263 _a1807
264 1 _aHoboken, NJ :
_bJohn Wiley & Sons ;
_aBeverly, MA :
_bScrivener Publishing,
_c2018.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aPrint version record and CIP data provided by publisher; resource not viewed.
504 _aIncludes bibliographical references and index.
520 _aThe purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective.
505 0 _aIntro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References.
505 8 _aChapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration.
505 8 _a5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.
505 8 _aChapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security.
505 8 _a8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time.
650 0 _aVirtual computer systems
_xSecurity measures.
_95625
650 0 _aCloud computing.
_94659
650 7 _aCOMPUTERS
_xComputer Literacy.
_2bisacsh
_95626
650 7 _aCOMPUTERS
_xComputer Science.
_2bisacsh
_95627
650 7 _aCOMPUTERS
_xData Processing.
_2bisacsh
_95628
650 7 _aCOMPUTERS
_xHardware
_xGeneral.
_2bisacsh
_95629
650 7 _aCOMPUTERS
_xInformation Technology.
_2bisacsh
_95630
650 7 _aCOMPUTERS
_xMachine Theory.
_2bisacsh
_95631
650 7 _aCOMPUTERS
_xReference.
_2bisacsh
_95632
650 7 _aCloud computing.
_2fast
_0(OCoLC)fst01745899
_94659
650 7 _aVirtual computer systems.
_2fast
_0(OCoLC)fst01167683
_94971
655 4 _aElectronic books.
_93294
700 1 _aLe, Dac-Nhuong,
_d1983-
_eeditor.
_95633
700 1 _aKumar, Raghvendra,
_d1987-
_eeditor.
_95634
700 1 _aNguyen, Nhu Gia,
_eeditor.
_95635
700 1 _aChatterjee, Jyotir Moy,
_eeditor.
_95636
776 0 8 _iPrint version:
_tCloud computing and virtualization.
_dHoboken, NJ : John Wiley & Sons ; Beverly, MA : Scrivener Publishing, 2018
_z9781119487906
_w(DLC) 2018007565
856 4 0 _uhttps://doi.org/10.1002/9781119488149
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c68505
_d68505