Advertisement

Cloud Computing with Security

Concepts and Practices

  • Naresh Kumar Sehgal
  • Pramod Chandra P. Bhatt
  • John M. Acken

Table of contents

  1. Front Matter
    Pages i-xliv
  2. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 1-11
  3. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 13-48
  4. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 49-59
  5. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 61-73
  6. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 75-97
  7. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 99-110
  8. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 111-141
  9. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 143-154
  10. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 155-172
  11. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 173-191
  12. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 193-215
  13. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 217-233
  14. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 235-259
  15. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 261-269
  16. Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
    Pages 271-313
  17. Back Matter
    Pages 315-355

About this book

Introduction

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc.  Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures.  The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic.  This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management.  Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.

  • Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud;
  • Describes for IT managers how to improve their Cloud Computing infrastructures;
  • Includes coverage of security concerns with Cloud operating models;
  • Uses several case studies to illustrate the “why’s and how’s” of migrating to the Cloud.

Keywords

Architecting the Cloud Design Decisions for Cloud Computing Service Models Internet of Things Edge Computing Cloud Computing and Information Security

Authors and affiliations

  • Naresh Kumar Sehgal
    • 1
  • Pramod Chandra P. Bhatt
    • 2
  • John M. Acken
    • 3
  1. 1.Data Center GroupIntel CorporationSanta ClaraUSA
  2. 2.Computer Science and Information Technology ConsultantRetd. Prof. IIT DelhiBangaloreIndia
  3. 3.Electrical and Computer EngineeringPortland State UniversityPortlandUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-24612-9
  • Copyright Information Springer Nature Switzerland AG 2020
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-030-24611-2
  • Online ISBN 978-3-030-24612-9
  • Buy this book on publisher's site