You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastruct...
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. ...
This book brings a thorough explanation on the path needed to use cloud computing technologies to run High-Performance Computing (HPC) applications. Besides presenting the motivation behind moving HPC applications to the cloud, it covers both essential and advanced issues on this topic such as deploying HPC applications and infrastructures, designing cloud-friendly HPC applications, and optimizing a provisioned cloud infrastructure to run this family of applications. Additionally, this book also describes the best practices to maintain and keep running HPC applications in the cloud by employing fault tolerance techniques and avoiding resource wastage. To give practical meaning to topics cove...
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architecture, with focus on best practices for using a dynamic cloud infrastructure, cloud operations management and cloud security. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book and invaluable introduction to the topic.
None
This book constitutes the thoroughly refereed post-conference proceedings of the third International Symposium on Intelligent Systems Technologies and Applications (ISTA’17), September 13-16, 2017, Manipal, Karnataka, India. All submissions were evaluated on the basis of their significance, novelty, and technical quality. This proceedings contains 34 papers selected for presentation at the Symposium.