Cloud Computing Solutions
Здесь есть возможность читать онлайн «Cloud Computing Solutions» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Cloud Computing Solutions
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:3 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 60
- 1
- 2
- 3
- 4
- 5
Cloud Computing Solutions: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cloud Computing Solutions»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems.
Audience
Cloud Computing Solutions — читать онлайн ознакомительный отрывок
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cloud Computing Solutions», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
This book covers a wide range of cloud computing-related technologies. The wide-ranging contents will differentiate this book from others. The topics are likely to be embedded with various aspects of cloud business model-enabled technologies. It aims to provide the concepts of related technologies based on novel findings of the researchers through its chapter organization. The primary audience for the book includes specialists, researchers, undergraduate students, designers, experts and engineers who are occupied with research.
The book is organized in independent chapters to provide greater readability, adaptability and flexibility to readers.
Souvik Pal
Dac-Nhuong Le
Prasant Kumar Pattnaik
Preface
Recently, cloud computing has been one of the emerging technologies in the fields of computer science and information technology (IT). The advancement of cloud computing has resulted from the fast-growing use of the internet among people. This book is intended for readers who have no prior knowledge of this subject. Some topics in this book are unique and based on published information, both current and timely, which will be helpful to research scholars as well as specialists working in cloud computing-related issues. It is suitable as an introductory text for a semester-length course in cloud computing for undergraduate and postgraduate science courses in computer science and information technology. The authors decided to work on an introductory textbook on this subject for the benefit of students and teachers. Some topics in this book are unique and based on published information which is both current and timely.
The key features of the book are as follows:
Discusses the evolution of cloud computing from grid computing, cluster computing, and distributed system.
Provides coverage of cloud computing environments and popular views of them.
Incorporates a survey of the virtualization environment and its latest developments.
Discusses live migration, database, auditing and applications as part of the materials related to cloud computing.
Provides concepts of cloud storage, cloud strategy planning and management, cloud security and privacy issues.
Explains complex concepts in a very simple manner.
Covers information appropriate for beginners as well as advanced users.
Presents information using layman’s terms and clear language.
Widely covers the latest topics.
Extensively uses analogies.
Souvik PalDac-Nhuong LePrasant Kumar PattnaikMarch 2022
Acknowledgments
First of all, we would like to thank all our colleagues and friends for sharing our happiness at the start of this project and following up with their encouragement when it seemed too difficult to complete. We are thankful to all the members of Scrivener Publishing, especially Martin Scrivener and Phillip Carmical, for giving us the opportunity to write this book.
Dr. Pal is grateful to his father, Prof. Bharat Kumar Pal, and mother, Smt. Tandra Pal, for their blessings and constant support. He is also grateful to his grandmother, the late Sakhi Rani Pal, and grandfater, the late Ajit Kumar Pal, for their affection and motivation. He is thankful to his beloved wife, Smita, and son, Binayak, for their love and encouragement.
Dr. Dac-Nhuong Le would like to acknowledge and thank the most important people in his life, his patents and his partner, for their support. This book has been a long-cherished dream which would not have been turned into reality without the support and love of these amazing people, who encouraged him with the right amount of time and attention. He is also grateful to his best friends for their blessings and unconditional love, patience and encouragement.
Prof. Pattnaik is grateful to his father, the late Ramanarayan Patnaik, his mother, Smt. Jayalakshimi Patnaik, his father-in-law, Er. Chittaranjan Mohanty, and mother-in-law, the late Renubala Mohanty, for their blessings. He is also thankful to his wife, Bismita, and daughter, Prasannakshi, for their love and support.
And above all, the God Almighty.
Souvik PalDac-Nhuong LePrasant Kumar Pattnaik
Acronyms
5G | The Next (5 th ) Generation |
ACID | Atomicity, Consistency, Isolation, Durability |
ACL | Access Control List |
AI | Artificial Intelligence |
AIIOT | Artificial Intelligence and Internet of Things |
AKS | Azure Kubernetes Service |
ALB | Adaptive Load Balancing |
AMQP | Advanced Message Queuing Protocol |
ANSI | American National Standards Institute |
API | Application Programming Interface |
ARP | Address Resolution Protocol |
ARPA | Advanced Research Projects Agency |
AS | Autonomous System |
ATL | Atlas Transformation Language |
AWS | Amazon Web Services |
BGP | Border Gateway Protocol |
BSM | Business Service Management |
BSP | Business Service Provider |
BSON | Binary JSON |
CAA | Cloud Application Architecture |
CAM | Content Addressable Memory |
CAP | Consistency, Availability, and Partition |
CapEx | Capital Expenditure |
CC | Cluster Controller |
CDP | Continuous Data Protection |
CDS | Content Delivery Servers |
CCE | Cloud Computing Environment |
CERN | European Organization for Nuclear Research |
CFI | Control Flow Integrity |
CIDR | Classless Inter-Domain Routing |
CIS | Cloud Information Service |
CLC | Cloud Controller |
CMR | Customer Relationship Management |
CODINE | Computing in Distributed Networked Environments |
COI | Community of Interest |
CPA | Cloud Platform Architecture |
CPU | Central Processing Unit |
CSA | Cloud Protection Alliance |
CSLB | Central Scheduler Load Balancing |
CSP | Cloud Service Provider |
DAM | Database Activity Monitoring |
DaaS | Database as a Service |
DBMS | Database Management System |
DCE | Data Center Efficiency |
DC | Distributed Computing |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
DHCP | Dynamic Host Configuration Protocol |
DLP | Data Loss Prevention |
DNS | Domain Name Server |
DNSSEC | Domain Name System Security Extensions |
DPM | Distributed Power Management |
DRS | Distributed Resource Scheduler |
DSM | Distributed Shared Memory |
DVFS | Dynamic Frequency Voltage Scaling |
ECMP | Equal-Cost Multi-Path |
EC2 | Elastic Compute Cloud |
ECN | Explicit Congestion Notification |
EPPKS | Efficient Privacy Preserving Keyword Search Scheme |
FAM | File Activity Monitoring |
FGBI | Fine-Grained Block Identification |
FCAPS | Fault, Configuration, Account, Performance, Security |
FC | Fiber Channel |
FC-SAN | FC-Based Storage Area Networks |
GA | Genetic Algorithm |
GAE | Google App Engine |
GVMI | Generic Virtual Machine Image |
GOC | Green Open Cloud |
GPS | Global Positioning System |
GPLv2 | General Public License |
GUI | Graphical User Interface |
HA | Homomorphic Authenticator |
HDFS | Hadoop Distributed File System |
HMAC | Hash Message Authentication Code |
HIPS | Host Intrusion Prevention System |
HME | Hypervisor Monitoring Environment |
HPC | Hardware Performance Computing |
HTTP | Hypertext Transfer Protocol |
HVM | Hardware-Assisted Virtual Machine |
IaaS | Infrastructure as a Service |
IDC | international Information Enterprise |
IDS | Intrusion Detection System |
IDS/IPS | Intrusion Detection System/Intrusion Prevention System |
IMA | Integrity Management Architecture |
IoT | Internet of Things |
IP | Internet Protocol |
IPsec | IP-Level Security |
IPS | Intrusion Prevention System |
IRM | In-Lined Reference Monitors |
ISA | Instruction Set Architecture |
IT | Information Technology |
I/O | Input/Output |
JSON | JavaScript Object Notation |
KVM | Kernel-Based Virtual Machine |
KBA | Knowledge-Based Answers/Questions |
LAN | Local Area Network |
LGPL | Lesser General Public License |
LLFC | Link Layer Flow Control |
LLM | Lightweight Live Migration |
LVM | Logical Volume Manager |
LVMM | Live Virtual Machine Migration |
MaaS | Model as a Service |
MAC | Media Access Control |
MCC | Mobile Cloud Computing |
MFA | Multi-Factor Authentication |
MiTM | Man-in-the-Middle Attack |
MP | Microprocessor |
MPI | Message Passing Interface |
MPLS | Multi-Protocol Label Switching |
MSN | Mobile Social Networking |
MVCC | Multi-Version Concurrency Control |
NAS | Network-Attached Storage |
NAC | Network Access Control |
NC | Node Controller |
NFS | Network File Server |
NSF | National Science Foundation |
NSFC | National Natural Science Foundation of China |
NIPS | Network Intrusion Prevention System |
NIC | Network Interface Controller |
NoSQL | Not-only-SQL |
NOW | Networks of Workstations |
NICs | Network Interface Cards |
NRDC | Natural Resources Defense Council |
OCR | Optical Character Recognition |
OLTP | Online Transaction Processing |
ONF | Open Networking Foundation |
OS | Operating System |
OSG | Object Storage Gateway |
OSP | Object Storage Provider |
OVS | Open vSwitch |
P2P | Peer-to-Peer |
PaaS | Platform as a Service |
PAP | Policy Access Points |
PC | Personal Computer |
PCB | Process Control Block |
PDT | Performance Degradation Time |
PDP | Policy Decision Points |
PEP | Policy Enforcement Points |
PKI | Public Key Infrastructure |
PMC | Performance Monitoring Counters |
POR | Proof of Retrievability |
POC | Proof of Concept |
PPW | Performance Per Watt |
PUE | Power Usage Effectiveness |
PVM | Parallel Virtual Machine |
PV | Public Verifiability |
QoS | Quality of Service |
RaaS | Resources as a Service |
RBAC | Role-Based Access Control |
RDBMS | Relationship Database Management System |
RDPC | Remote Data Processing Scheme |
RDS | Relational Database System |
RED | Random Early Detection |
RLE | Run-Length Encoding |
RPC | Remote Procedure Call Protocol |
RPM | Red Hat Package Manager |
RSA | Rivest–Shamir–Adleman |
RTT | Round-Trip Time |
S3 | Simple Storage Service |
SAN | Storage Area Network |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SC | Storage Controller |
SDN | Software-Defined Networks |
SECaaS | Security as a Service |
SEaaS | Sensor Event as a Service |
SFI | Software Fault Isolation |
SIEM | Security Information and Event Management |
SLA | Service-Level Agreements |
SMC | Secure Multi-Party Computation |
SME | Small Medium Enterprise |
SMP | Symmetric Multi-Processing |
SOAP | Simple Object Access Protocol |
SOA | Service-Oriented Architecture |
SPT | Shadow Page Table |
SQL | Structured Query Language |
SSC | SQL Server Compact |
SSH | Password-Based Auth |
SSI | Single System Image |
STP | Spanning Tree Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TDS | Tabular Data Stream |
TPA | Third-Party Auditor |
TPAS | Third-Party Auditing Service |
TPM | Trusted Platform Module |
TTP | Trusted Third Party |
TCG | Trusted Computing Group |
TCP/IP | Transmission Control Protocol/Internet Protocol |
UDB | User Database |
UFS | User-Facing Service |
VDCs | Virtual Data Centers |
VDI | Virtual Desktop Infrastructure |
VEE | Virtual Environment Extension |
VLAN | Virtual Local Area Network |
VLB | Valiant Load Balancing |
VM | Virtual Machine |
VMLM | Virtual Machine Live Migration |
VMM | Virtual Machine Migration |
VO | Virtual Organization |
VPC | Virtual Predict Checkpointing |
VPN | Virtual Private Network |
WaaS | Workflow as a Service |
WAN | Wide Area Network |
WSN | Wireless Sensor Network |
WWS | Writable Working Set |
WWW | World Wide Web |
XSS | Cross-Site Scripting |
XML | Extensible Markup Language |
YARN | Yet Another Resource Negotiator |
1
Интервал:
Закладка:
Похожие книги на «Cloud Computing Solutions»
Представляем Вашему вниманию похожие книги на «Cloud Computing Solutions» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Cloud Computing Solutions» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.