Foreword |
|
xi | |
|
Foreword |
|
xiii | |
|
Preface |
|
xv | |
Acknowledgment |
|
xxii | |
|
Section 1 Cloud Computing Overview |
|
|
|
Chapter 1 Cloud Computing Overview |
|
|
1 | (24) |
|
|
|
|
|
|
The History of Cloud Computing |
|
|
1 | (2) |
|
|
3 | (4) |
|
The Wave of Cloud Transformation in the Global Information Industry |
|
|
7 | (11) |
|
Exploring the Cloud Era Market Demand |
|
|
18 | (6) |
|
|
24 | (1) |
|
Chapter 2 Main Components of Cloud Computing |
|
|
25 | (26) |
|
|
|
|
|
|
Cloud Era Information Hub |
|
|
25 | (5) |
|
Cloud Era Communication Networks |
|
|
30 | (6) |
|
Intelligent Terminals of the Cloud Era |
|
|
36 | (5) |
|
Cloud Computing and the Internet of Things |
|
|
41 | (8) |
|
Conclusions and Looking to the Future |
|
|
49 | (2) |
|
Chapter 3 Cloud Infrastructure: Virtualization |
|
|
51 | (27) |
|
|
|
|
|
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (8) |
|
|
61 | (5) |
|
|
66 | (6) |
|
|
72 | (6) |
|
Section 2 Data Management and Data Security |
|
|
|
Chapter 4 Trusted Cloud Initiative Reference Architecture |
|
|
78 | (16) |
|
|
|
|
|
|
Overview of the Reference Architecture |
|
|
78 | (1) |
|
How to Use the TCI Reference Architecture |
|
|
79 | (1) |
|
Security and Risk Management: Protecting Data and Managing Risk |
|
|
80 | (3) |
|
Relationships to Other Domains |
|
|
83 | (2) |
|
Business Operation Support Services: Partners with the Business |
|
|
85 | (3) |
|
Technology Solution Domains |
|
|
88 | (6) |
|
Chapter 5 Security Information and Event Management Implementation Guidance |
|
|
94 | (22) |
|
|
|
|
|
|
|
95 | (1) |
|
|
96 | (6) |
|
Architectural Implementation |
|
|
102 | (4) |
|
|
106 | (10) |
|
Chapter 6 Enterprise Security Monitoring with the Fusion Center Model |
|
|
116 | (16) |
|
|
|
|
|
|
Emerging Threats: Advanced Attacks |
|
|
116 | (1) |
|
Problems in Defense: Inadequate Actionable Information and Organizational Silos |
|
|
117 | (3) |
|
Countermeasure Solutions: Cross-Boundary Enterprise Monitoring |
|
|
120 | (3) |
|
Monitoring Information Sharing |
|
|
123 | (2) |
|
Vision: Global Correlation and Intelligence |
|
|
125 | (5) |
|
|
130 | (2) |
|
Chapter 7 Data Protection in the Cloud Era |
|
|
132 | (24) |
|
|
|
|
|
|
|
132 | (2) |
|
Understanding the Problem |
|
|
134 | (6) |
|
The Vision: Where We Want to Be |
|
|
140 | (1) |
|
The Strategy: How We Get There |
|
|
141 | (12) |
|
Next Steps: Considerations for Reference Architecture |
|
|
153 | (3) |
|
Section 3 Data Storage and Big Data |
|
|
|
Chapter 8 Big Data Overview |
|
|
156 | (29) |
|
|
|
|
|
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (4) |
|
|
165 | (6) |
|
|
171 | (14) |
|
Chapter 9 Big Data Techniques, Tools, and Applications |
|
|
185 | (29) |
|
|
|
|
|
|
|
185 | (1) |
|
|
186 | (12) |
|
|
198 | (7) |
|
|
205 | (9) |
|
Section 4 Networking in the Cloud Era |
|
|
|
Chapter 10 Cloud Computing Networks: Utilizing the Content Delivery Network |
|
|
214 | (12) |
|
|
|
|
|
214 | (1) |
|
Opportunities and Challenges of Cloud Computing |
|
|
215 | (3) |
|
|
218 | (1) |
|
CDN Evaluation in the Microsoft Cloud |
|
|
219 | (4) |
|
Future Improvements for the Cloud CDN |
|
|
223 | (1) |
|
|
224 | (2) |
|
Chapter 11 Data Transfer and Storage in Cloud Computing |
|
|
226 | (12) |
|
|
|
|
|
|
|
226 | (3) |
|
|
229 | (9) |
|
Chapter 12 Parallel Data Transfer Protocol |
|
|
238 | (18) |
|
|
|
|
|
|
|
239 | (1) |
|
|
240 | (1) |
|
Parallel Data Transfer Challenges |
|
|
241 | (1) |
|
CSTP: Cross-Stream Transfer Protocol |
|
|
242 | (5) |
|
|
247 | (3) |
|
Scale CSTP to Large Number of Streams |
|
|
250 | (3) |
|
|
253 | (3) |
|
Chapter 13 Border Adaptive Micro-Base-Station for Wireless Communications |
|
|
256 | (13) |
|
|
|
|
256 | (2) |
|
Ultimate Goal of Wireless Telecom: To Provide Homogenous Service Level Comparable to the Wired Network |
|
|
258 | (1) |
|
Understanding of the Shannon Theory from a New Angle |
|
|
259 | (2) |
|
Enhancing the Micro-Base-Station Principle to the Extreme |
|
|
261 | (1) |
|
Centralized Time Division Multiple Access (CTDMA) |
|
|
262 | (3) |
|
Part-Time Wireless Network Operators |
|
|
265 | (1) |
|
Uninterrupted Wireless Communication Services During Catastrophes |
|
|
265 | (1) |
|
|
266 | (3) |
|
|
|
Chapter 14 Impact of Cultural Differences on the Cloud Computing Ecosystems in the USA and China |
|
|
269 | (15) |
|
|
|
|
|
270 | (1) |
|
|
270 | (2) |
|
Cultural Influences on Information Technology (IT) |
|
|
272 | (1) |
|
Cultural Differences Between The U.S. and China and their Impact on Cloud Computing |
|
|
273 | (3) |
|
|
276 | (1) |
|
|
277 | (3) |
|
Supporting Questions Around Culture Dimensions |
|
|
280 | (2) |
|
|
282 | (1) |
|
|
282 | (2) |
|
Chapter 15 Cloud Strategy Leads Innovation in China |
|
|
284 | (6) |
|
|
|
|
|
|
|
284 | (1) |
|
A New Generation of E-Government Platform |
|
|
285 | (2) |
|
Micro-Entrepreneurship and Civilian Innovation |
|
|
287 | (1) |
|
|
288 | (2) |
Compilation of References |
|
290 | (17) |
About the Contributors |
|
307 | (3) |
Index |
|
310 | |