0%

Book Description

Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives.

The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing. They then survey some of the critical components that are necessary to make the cloud computing paradigm feasible. They also present various standards based on the use and implementation issues surrounding cloud computing and describe the infrastructure management that is maintained by cloud computing service providers. After addressing significant legal and philosophical issues, the book concludes with a hard look at successful cloud computing vendors.

Helping to overcome the lack of understanding currently preventing even faster adoption of cloud computing, this book arms readers with guidance essential to make smart, strategic decisions on cloud initiatives.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Contents (1/2)
  5. Contents (2/2)
  6. Foreword (1/2)
  7. Foreword (2/2)
  8. Preface (1/2)
  9. Preface (2/2)
  10. Introduction (1/3)
  11. Introduction (2/3)
  12. Introduction (3/3)
  13. Chapter 1: The Evolution of Cloud Computing (1/6)
  14. Chapter 1: The Evolution of Cloud Computing (2/6)
  15. Chapter 1: The Evolution of Cloud Computing (3/6)
  16. Chapter 1: The Evolution of Cloud Computing (4/6)
  17. Chapter 1: The Evolution of Cloud Computing (5/6)
  18. Chapter 1: The Evolution of Cloud Computing (6/6)
  19. Chapter 2: Web Services Delivered from the Cloud (1/6)
  20. Chapter 2: Web Services Delivered from the Cloud (2/6)
  21. Chapter 2: Web Services Delivered from the Cloud (3/6)
  22. Chapter 2: Web Services Delivered from the Cloud (4/6)
  23. Chapter 2: Web Services Delivered from the Cloud (5/6)
  24. Chapter 2: Web Services Delivered from the Cloud (6/6)
  25. Chapter 3: Building Cloud Networks (1/10)
  26. Chapter 3: Building Cloud Networks (2/10)
  27. Chapter 3: Building Cloud Networks (3/10)
  28. Chapter 3: Building Cloud Networks (4/10)
  29. Chapter 3: Building Cloud Networks (5/10)
  30. Chapter 3: Building Cloud Networks (6/10)
  31. Chapter 3: Building Cloud Networks (7/10)
  32. Chapter 3: Building Cloud Networks (8/10)
  33. Chapter 3: Building Cloud Networks (9/10)
  34. Chapter 3: Building Cloud Networks (10/10)
  35. Chapter 4: Virtualization Practicum (1/6)
  36. Chapter 4: Virtualization Practicum (2/6)
  37. Chapter 4: Virtualization Practicum (3/6)
  38. Chapter 4: Virtualization Practicum (4/6)
  39. Chapter 4: Virtualization Practicum (5/6)
  40. Chapter 4: Virtualization Practicum (6/6)
  41. Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud (1/5)
  42. Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud (2/5)
  43. Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud (3/5)
  44. Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud (4/5)
  45. Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud (5/5)
  46. Chapter 6: Security in the Cloud (1/6)
  47. Chapter 6: Security in the Cloud (2/6)
  48. Chapter 6: Security in the Cloud (3/6)
  49. Chapter 6: Security in the Cloud (4/6)
  50. Chapter 6: Security in the Cloud (5/6)
  51. Chapter 6: Security in the Cloud (6/6)
  52. Chapter 7: Common Standards in Cloud Computing (1/6)
  53. Chapter 7: Common Standards in Cloud Computing (2/6)
  54. Chapter 7: Common Standards in Cloud Computing (3/6)
  55. Chapter 7: Common Standards in Cloud Computing (4/6)
  56. Chapter 7: Common Standards in Cloud Computing (5/6)
  57. Chapter 7: Common Standards in Cloud Computing (6/6)
  58. Chapter 8: End-User Access to Cloud Computing (1/5)
  59. Chapter 8: End-User Access to Cloud Computing (2/5)
  60. Chapter 8: End-User Access to Cloud Computing (3/5)
  61. Chapter 8: End-User Access to Cloud Computing (4/5)
  62. Chapter 8: End-User Access to Cloud Computing (5/5)
  63. Chapter 9: Mobile Internet Devices and the Cloud (1/6)
  64. Chapter 9: Mobile Internet Devices and the Cloud (2/6)
  65. Chapter 9: Mobile Internet Devices and the Cloud (3/6)
  66. Chapter 9: Mobile Internet Devices and the Cloud (4/6)
  67. Chapter 9: Mobile Internet Devices and the Cloud (5/6)
  68. Chapter 9: Mobile Internet Devices and the Cloud (6/6)
  69. Appendix A: Virtualization Practicum (Linux) (1/5)
  70. Appendix A: Virtualization Practicum (Linux) (2/5)
  71. Appendix A: Virtualization Practicum (Linux) (3/5)
  72. Appendix A: Virtualization Practicum (Linux) (4/5)
  73. Appendix A: Virtualization Practicum (Linux) (5/5)
  74. Appendix B: Executive Scenario for Cloud Migration (1/3)
  75. Appendix B: Executive Scenario for Cloud Migration (2/3)
  76. Appendix B: Executive Scenario for Cloud Migration (3/3)
  77. Index (1/2)
  78. Index (2/2)
18.216.123.120