000 03856nam a22005415i 4500
001 978-3-030-24612-9
003 DE-He213
005 20220801213907.0
007 cr nn 008mamaa
008 190904s2020 sz | s |||| 0|eng d
020 _a9783030246129
_9978-3-030-24612-9
024 7 _a10.1007/978-3-030-24612-9
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aSehgal, Naresh Kumar.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_935040
245 1 0 _aCloud Computing with Security
_h[electronic resource] :
_bConcepts and Practices /
_cby Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken.
250 _a2nd ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXLIV, 355 p. 206 illus., 190 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Foundations of Cloud Computing -- Cloud Computing Pyramid -- Features of Private and Public Clouds -- Cloud Workload Characterization -- Cloud Management and Monitoring -- Cloud Computing and Information Security -- Migrating to Cloud -- Migrating a Complex Industry to Cloud -- Cost and Billing practices in Cloud -- Analytics in the Cloud -- Additional Security Considerations for Clouds -- Future trends in Cloud Computing -- A Quick Test of your Cloud fundamentals grasp -- Hands-on project to use Cloud Service Provider.
520 _aThis book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices. Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud; Describes for IT managers how to improve their Cloud Computing infrastructures; Includes coverage of security concerns with Cloud operating models; Uses several case studies to illustrate the “why’s and how’s” of migrating to the Cloud.
650 0 _aElectronic circuits.
_919581
650 0 _aTelecommunication.
_910437
650 0 _aComputer networks .
_931572
650 1 4 _aElectronic Circuits and Systems.
_935041
650 2 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aComputer Communication Networks.
_935042
700 1 _aBhatt, Pramod Chandra P.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_935043
700 1 _aAcken, John M.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_935044
710 2 _aSpringerLink (Online service)
_935045
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030246112
776 0 8 _iPrinted edition:
_z9783030246136
776 0 8 _iPrinted edition:
_z9783030246143
856 4 0 _uhttps://doi.org/10.1007/978-3-030-24612-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75722
_d75722