Atjaunināt sīkdatņu piekrišanu

Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management [Hardback]

Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 253,69 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
"This book discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future"--

Computer and information scientists and business specialists examine cloud computing from such perspectives as its main components, trusted cloud initiative reference architecture, security information and event management implementation guidance, data protection in the cloud era, monitoring enterprise security with the fusion center model, big data, utilizing the content delivery network, parallel data transfer protocol, and the impact of cultural differences on the cloud computing ecosystems in the US and China. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)

Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level. Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future.
Foreword xi
Howard A. Schmidt
Foreword xiii
Aloysius Cheang
Preface xv
Acknowledgment xxii
Section 1 Cloud Computing Overview
Chapter 1 Cloud Computing Overview
1(24)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
The History of Cloud Computing
1(2)
Cloud Computing Models
3(4)
The Wave of Cloud Transformation in the Global Information Industry
7(11)
Exploring the Cloud Era Market Demand
18(6)
Conclusion
24(1)
Chapter 2 Main Components of Cloud Computing
25(26)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Cloud Era Information Hub
25(5)
Cloud Era Communication Networks
30(6)
Intelligent Terminals of the Cloud Era
36(5)
Cloud Computing and the Internet of Things
41(8)
Conclusions and Looking to the Future
49(2)
Chapter 3 Cloud Infrastructure: Virtualization
51(27)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Virtualization Overview
51(1)
Virtualization Processes
52(1)
Server Virtualization
53(8)
Storage Virtualization
61(5)
Network Virtualization
66(6)
Desktop Virtualization
72(6)
Section 2 Data Management and Data Security
Chapter 4 Trusted Cloud Initiative Reference Architecture
78(16)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Overview of the Reference Architecture
78(1)
How to Use the TCI Reference Architecture
79(1)
Security and Risk Management: Protecting Data and Managing Risk
80(3)
Relationships to Other Domains
83(2)
Business Operation Support Services: Partners with the Business
85(3)
Technology Solution Domains
88(6)
Chapter 5 Security Information and Event Management Implementation Guidance
94(22)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Overview
95(1)
Requirements
96(6)
Architectural Implementation
102(4)
Technical Implementation
106(10)
Chapter 6 Enterprise Security Monitoring with the Fusion Center Model
116(16)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Emerging Threats: Advanced Attacks
116(1)
Problems in Defense: Inadequate Actionable Information and Organizational Silos
117(3)
Countermeasure Solutions: Cross-Boundary Enterprise Monitoring
120(3)
Monitoring Information Sharing
123(2)
Vision: Global Correlation and Intelligence
125(5)
Conclusion
130(2)
Chapter 7 Data Protection in the Cloud Era
132(24)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
132(2)
Understanding the Problem
134(6)
The Vision: Where We Want to Be
140(1)
The Strategy: How We Get There
141(12)
Next Steps: Considerations for Reference Architecture
153(3)
Section 3 Data Storage and Big Data
Chapter 8 Big Data Overview
156(29)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
156(1)
Big Data Definition
157(1)
Big Data Characteristics
158(1)
Big Data Value
159(2)
Big Data Structure
161(4)
Big Data Analytics
165(6)
The Big Data Ecosystem
171(14)
Chapter 9 Big Data Techniques, Tools, and Applications
185(29)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
185(1)
Big Data Technologies
186(12)
Big Data Applications
198(7)
Big Data Services
205(9)
Section 4 Networking in the Cloud Era
Chapter 10 Cloud Computing Networks: Utilizing the Content Delivery Network
214(12)
Yale Li
Yushi Shen
Yudong Liu
Cloud Computing Overview
214(1)
Opportunities and Challenges of Cloud Computing
215(3)
Akamai CDN Technology
218(1)
CDN Evaluation in the Microsoft Cloud
219(4)
Future Improvements for the Cloud CDN
223(1)
Conclusion
224(2)
Chapter 11 Data Transfer and Storage in Cloud Computing
226(12)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
226(3)
Related Works
229(9)
Chapter 12 Parallel Data Transfer Protocol
238(18)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
239(1)
Forward Error Correction
240(1)
Parallel Data Transfer Challenges
241(1)
CSTP: Cross-Stream Transfer Protocol
242(5)
CSTP Implementation
247(3)
Scale CSTP to Large Number of Streams
250(3)
Conclusion
253(3)
Chapter 13 Border Adaptive Micro-Base-Station for Wireless Communications
256(13)
Henry Gao
Yushi Shen
Introduction
256(2)
Ultimate Goal of Wireless Telecom: To Provide Homogenous Service Level Comparable to the Wired Network
258(1)
Understanding of the Shannon Theory from a New Angle
259(2)
Enhancing the Micro-Base-Station Principle to the Extreme
261(1)
Centralized Time Division Multiple Access (CTDMA)
262(3)
Part-Time Wireless Network Operators
265(1)
Uninterrupted Wireless Communication Services During Catastrophes
265(1)
Conclusion
266(3)
Section 5 Appendix
Chapter 14 Impact of Cultural Differences on the Cloud Computing Ecosystems in the USA and China
269(15)
Yushi Shen
Jie Yang
Tayfun Keskin
Introduction
270(1)
Cloud Computing
270(2)
Cultural Influences on Information Technology (IT)
272(1)
Cultural Differences Between The U.S. and China and their Impact on Cloud Computing
273(3)
Methodology
276(1)
Results
277(3)
Supporting Questions Around Culture Dimensions
280(2)
Analysis
282(1)
Conclusion
282(2)
Chapter 15 Cloud Strategy Leads Innovation in China
284(6)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction
284(1)
A New Generation of E-Government Platform
285(2)
Micro-Entrepreneurship and Civilian Innovation
287(1)
Conclusion and Outlook
288(2)
Compilation of References 290(17)
About the Contributors 307(3)
Index 310