This book describes cloud computing as a service that is "highly scalable" and operates in "a resilient environment". The authors emphasize architectural layers and models - but also business and security factors.
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches
**Get the eBook version free when you purchase the paperback version** The cloud can be regarded as services and software residing and operating on the Internet rather than on a local computer or on-premise network of servers. Cloud adoption is a strategy utilized by companies to enhance the scalability of Internet-based data base capabilities while minimizing risk and cost. To accomplish this, businesses implement cloud computing or utilize remote servers hosted on the internet to store, manage, and process data. Without a centralized strategy for cloud adoption, companies are subject to "cloud sprawl", leading to issues with security, compliance and increased costs. CIOs should focus on creating and executing a centralized cloud strategy and utilize it as the foundation for managing the use of cloud services across the business. A poorly implemented cloud strategy can increase cost and reduce agility, thus should involve IT operations and security team during the planning phase. What You'll Learn Leverage cloud computing practices to successfully build a cost-effective cloud environment. Select the most ideal cloud service model, and execute suitable cloud design strategies for your company. Manage changes in the cloud transition and digital transformation process. Implement cloud computing solutions efficiently and effectively. Use case patterns for cloud models and types. Best practices for adopting cloud computing.
The Only Official Google Cloud Study Guide The Official Google Cloud Certified Associate Cloud Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Engineering certification. Beginning with a pre-book assessment quiz to evaluate what you know before you begin, each chapter features exam objectives and review questions, plus the online learning environment includes additional complete practice tests. Written by Dan Sullivan, a popular and experienced online course author for machine learning, big data, and Cloud topics, Official Google Cloud Certified Associate Cloud Engineer Study Guide is your ace in the hole for deploying and managing Google Cloud Services. Select the right Google service from the various choices based on the application to be built Compute with Cloud VMs and managing VMs Plan and deploying storage Network and configure access and security Google Cloud Platform is a leading public cloud that provides its users to many of the same software, hardware, and networking infrastructure used to power Google services. Businesses, organizations, and individuals can launch servers in minutes, store petabytes of data, and implement global virtual clouds with the Google Cloud Platform. Certified Associate Cloud Engineers have demonstrated the knowledge and skills needed to deploy and operate infrastructure, services, and networks in the Google Cloud. This exam guide is designed to help you understand the Google Cloud Platform in depth so that you can meet the needs of those operating resources in the Google Cloud.
Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms. - Learn about recent trends in cloud computing in critical areas such as: resource management, security, energy consumption, ethics, and complex systems - Get a detailed hands-on set of practical recipes that help simplify the deployment of a cloud based system for practical use of computing clouds along with an in-depth discussion of several projects - Understand the evolution of cloud computing and why the cloud computing paradigm has a better chance to succeed than previous efforts in large-scale distributed computing
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson—an IBM senior technical staff member—shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.
Master MongoDB - The widely used modern database in a step-by-step, practical, and easy-to-understand approach covering all major topics KEY FEATURES ● In-depth practical demonstration of MongoDB concepts with numerous examples. ● Includes graphical illustrations and visual explanations for MongoDB commands and methods. ● Covers advanced topics such as MongoDB Compass, MongoDB Security, Backup and Restore, and Replication and Sharding. DESCRIPTION MongoDB Complete Guide book starts with the basics of MongoDB, what exactly is MongoDB, and how to use it practically. You will understand how MongoDB is different from the traditional RDBMS. Topics such as installation and configuration of the MongoDB server, MongoDB commands, MongoDB Shell methods, and data types in MongoDB are covered in detail. You will practice how to perform MongoDB CRUD operations, indexing, MongoDB query selectors, projection in MongoDB and projection operators as well as aggregation in a very detailed and step-by-step manner. You learn how to work with MongoDB Compass and some of the advanced MongoDB topics like managing and administering MongoDB, managing the MongoDB process, monitoring and diagnosing MongoDB, backup and restore, MongoDB security, replication and sharding. WHAT YOU WILL LEARN ● Perform write operations, search documents, and define complex queries in MongoDB. ● Perform indexing, aggregation, and data replication. ● End-to-end MongoDB administration along with authentication and authorization. ● Running backups, restoring, and monitoring of MongoDB database enterprise-wide. WHO THIS BOOK IS FOR This book is designed for software developers and server administrators who want to quickly learn MongoDB basics and start applying the knowledge of MongoDB in their business systems. TABLE OF CONTENTS MongoDB Basics 1.Introduction to MongoDB 2. MongoDB Installation and Setup on Windows 3. MongoDB Installation and Setup on Linux (Ubuntu) 4. MongoDB Installation and Setup on macOS 5. Getting started with MongoDB 6. Storage Engines in MongoDB 7. Managing and Administering MongoDB 8. MongoDB Shell Methods 9. Data Types in MongoDB MongoDB Intermediate Level Topics 10. Introduction to MongoDB CRUD Operations 11. MongoDB Intermediate Concepts 12. Introduction to MongoDB Indexes 13. MongoDB Query Selectors 14. Projection in MongoDB and Projection Operators 15. Aggregation in MongoDB 16. MongoDB Data Manipulations Using MongoDB Compass MongoDB Advanced Level Topics 17. Managing and Administering MongoDB (Advanced Level) 18. Replication in MongoDB 19. Sharding in MongoDB
Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors take a theoretical and practical approach, starting with the key questions to help uncover needs and clarify project scope. They then demonstrate probability tools to test and support decisions, and provide processes that resolve key issues. After laying a foundation of cloud concepts and definitions, the book addresses data center creation, infrastructure development, cost modeling, and simulations in decision-making, each part building on the previous. In this way the authors bridge technology, management, and infrastructure as a service, in one complete guide to data centers that facilitates educated decision making. - Explains how to balance cloud computing functionality with data center efficiency - Covers key requirements for power management, cooling, server planning, virtualization, and storage management - Describes advanced methods for modeling cloud computing cost including Real Option Theory and Monte Carlo Simulations - Blends theoretical and practical discussions with insights for developers, consultants, and analysts considering data center development
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.