Welcome to Central Library, SUST

Cloud management and security / (Record no. 64966)

MARC details
000 -LEADER
fixed length control field 13514cam a2201009 i 4500
001 - CONTROL NUMBER
control field sulb-eb0033314
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170713221402.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140527s2014 enk ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014020190
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency YDX
-- IDEBK
-- N$T
-- TEFOD
-- DG1
-- E7B
-- YDXCP
-- UKMGB
-- CUI
-- COO
-- OCLCF
-- AU@
-- CDX
-- TEFOD
-- OCLCQ
-- RRP
-- B24X7
-- EBLCP
-- DEBSZ
-- DEBBG
-- BD-SySUS
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 016774653
Source Uk
019 ## -
-- 889561442
-- 893648935
-- 927508903
-- 961649248
-- 962631328
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118817063 (Adobe PDF)
International Standard Book Number 1118817060 (Adobe PDF)
International Standard Book Number 9781118817070 (ePub)
International Standard Book Number 1118817079 (ePub)
Canceled/invalid ISBN 9781118817094 (hardback)
International Standard Book Number 9781118817087
International Standard Book Number 1118817087
Canceled/invalid ISBN 1118817095
Canceled/invalid ISBN 9781306841177
Canceled/invalid ISBN 1306841178
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 15592056
OCLC library identifier AU@
System control number 000052933337
OCLC library identifier CHVBK
System control number 325940207
OCLC library identifier CHBIS
System control number 010259704
OCLC library identifier DEBSZ
System control number 475025911
OCLC library identifier DEBBG
System control number BV043396802
OCLC library identifier CHVBK
System control number 374467285
OCLC library identifier CHNEW
System control number 000887811
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)880672205
Canceled/invalid control number (OCoLC)889561442
-- (OCoLC)893648935
-- (OCoLC)927508903
-- (OCoLC)961649248
-- (OCoLC)962631328
037 ## - SOURCE OF ACQUISITION
Stock number 9144F636-2885-405B-8EC3-BC76273EF2BA
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 013000
Source bisacsh
Subject category code COM
Subject category code subdivision 014000
Source bisacsh
Subject category code COM
Subject category code subdivision 018000
Source bisacsh
Subject category code COM
Subject category code subdivision 067000
Source bisacsh
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
Subject category code COM
Subject category code subdivision 037000
Source bisacsh
Subject category code COM
Subject category code subdivision 052000
Source bisacsh
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.67/82
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number TEC041000
Number source bisacsh
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Abbadi, Imad M.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cloud management and security /
Statement of responsibility, etc. Imad M. Abbadi.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Chichester, West Sussex ;
-- Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons Inc.,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--
Assigning source Provided by publisher.
500 ## - GENERAL NOTE
General note Machine generated contents note: Preface ix References xii 1 Introduction 1 1.1 Overview 1 1.2 Cloud definition 2 1.3 Cloud evolution 3 1.4 Cloud services 5 1.5 Cloud deployment types 6 1.6 Main challenges of Clouds 7 1.7 Summary 10 1.8 Exercises 10 References 11 Part One Cloud management 13 2 Cloud structure 15 2.1 Introduction 15 2.2 Infrastructure components 15 2.3 Cloud Layers 17 2.4 Cloud relations 23 2.5 Cloud dynamics 27 2.6 Data types 27 2.7 Summary 30 2.8 Exercises 30 References 30 3 Fundamentals of Cloud management 31 3.1 Introduction 31 3.2 Clouds management services 32 3.3 Virtual control center 37 3.4 Prerequisite input-data for the management services 37 3.5 Management of user requirements 40 3.6 Summary 46 3.7 Exercises 47 References 47 4 Cloud properties 49 4.1 Introduction 49 4.2 Adaptability property 50 4.3 Resilience property 51 4.4 Scalability property 52 4.5 Availability property 53 4.6 Reliability property 53 4.7 Security and privacy property 54 4.8 Business model 55 4.9 Summary 56 4.10 Exercises 57 References 57 5 Automated management services 59 5.1 Introduction 59 5.2 Virtual layer self-managed services 60 5.3 Virtual services interdependency 65 5.4 Application layer self-managed services 67 5.5 Application services interdependency 70 5.6 Security and privacy by design 71 5.7 Multi-tier application deployment in the Cloud 73 5.8 Main challenges and requirements 79 5.9 Summary 82 5.10 Exercises 82 References 83 Part Two Clouds security fundamentals 85 6 Background 87 6.1 Topics flow 87 6.2 Trusted Computing 89 6.3 Summary 97 References 97 7 Challenges for establishing trust in Clouds 99 7.1 Introduction 99 7.2 Effects of Cloud dynamism on trust relationships 100 7.3 Challenges 103 7.4 Summary 105 7.5 Exercises 105 References 105 8 Establishing trust in Clouds 107 8.1 Introduction 107 8.2 Organization requirements 107 8.3 Framework requirements 108 8.4 Device properties 111 8.5 Framework architecture 112 8.6 Required software agents 116 8.7 Framework workflow 119 8.8 Discussion and analysis 125 8.9 Summary 126 8.10 Exercises 127 References 127 9 Clouds chains of trust 129 9.1 Introduction 129 9.2 Software agents revision 130 9.3 Roots of and chains of trust definition 130 9.4 Intra-layer chains of trust 132 9.5 Trust across layers 140 9.6 Summary 143 9.7 Exercises 143 References 143 10 Provenance in Clouds 145 10.1 Introduction 145 10.2 Motivating scenarios 148 10.3 Log records management and requirements 150 10.4 Framework domain architecture 155 10.5 Framework software agents 157 10.6 Framework workflow 160 10.7 Threat analysis 171 10.8 Discussion and future directions 173 10.9 Exercises 175 References 175 11 Insiders 177 11.1 Introduction 177 11.2 Insiders definition 178 11.3 Conceptual models 182 11.4 Summary 185 11.5 Exercises 185 References 186 Part Three Practical examples 187 12 Real life examples 189 12.1 Open Stack 189 12.2 Amazon web services 195 12.3 Component architecture 197 12.4 Prototype 203 12.5 Summary 209 Reference 209 13 Case study 211 13.1 Scenario 211 13.2 Home healthcare architecture in the Cloud 212 13.3 Insiders analysis for home healthcare 212 13.4 Cloud threats 220 References 226 .
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1.Introduction -- 1.1.Overview -- 1.2.Cloud Definition -- 1.3.Cloud Evolution -- 1.4.Cloud Services -- 1.5.Cloud Deployment Types -- 1.6.Main Challenges of Clouds -- 1.7.Summary -- 1.8.Exercises -- References -- 2.Cloud Structure -- 2.1.Introduction -- 2.2.Infrastructure Components -- 2.2.1.Storage Components -- 2.2.2.Physical Servers -- 2.2.3.Network Components -- 2.3.Cloud Layers -- 2.3.1.Vertical Slices -- 2.3.2.Horizontal Slices -- 2.3.3.Horizontal vs. Vertical Slices -- 2.3.4.Illustrative Example -- 2.4.Cloud Relations -- 2.4.1.Intra-layer Relations -- 2.4.2.Across-layer Relations -- 2.5.Cloud Dynamics -- 2.6.Data Types -- 2.7.Summary -- 2.8.Exercises -- References -- 3.Fundamentals of Cloud Management -- 3.1.Introduction -- 3.2.Clouds Management Services -- 3.2.1.Application Deployment Scenario -- 3.2.2.Identifying Cloud Management Services -- 3.3.Virtual Control Center -- 3.4.Prerequisite Input Data for Management Services
Formatted contents note 3.5.Management of User Requirements -- 3.5.1.Requirement Management Workflow -- 3.5.2.Challenges and Requirements -- 3.5.3.Categories and Delegation of User Requirements -- 3.5.4.Illustrative Example -- 3.6.Summary -- 3.7.Exercises -- References -- 4.Cloud Properties -- 4.1.Introduction -- 4.2.Adaptability Property -- 4.3.Resilience Property -- 4.4.Scalability Property -- 4.5.Availability Property -- 4.6.Reliability Property -- 4.7.Security and Privacy Property -- 4.8.Business Model -- 4.9.Summary -- 4.10.Exercises -- References -- 5.Automated Management Services -- 5.1.Introduction -- 5.2.Virtual Layer Self-managed Services -- 5.2.1.Adaptability as a Virtual Service -- 5.2.2.System Architect as a Virtual Service -- 5.2.3.Resilience as a Virtual Service -- 5.2.4.Scalability as a Virtual Service -- 5.2.5.Availability as a Virtual Service -- 5.2.6.Reliability as a Virtual Service -- 5.3.Virtual Services Interdependency
Formatted contents note 5.4.Application Layer Self-managed Services -- 5.4.1.Adaptability as an Application Service -- 5.4.2.Resilience as an Application Service -- 5.4.3.Scalability as an Application Service -- 5.4.4.Availability as an Application Service -- 5.4.5.Reliability as an Application Service -- 5.5.Application Services Interdependency -- 5.6.Security and Privacy by Design -- 5.7.Multi-tier Application Deployment in the Cloud -- 5.7.1.Application Architecture -- 5.7.2.Managed Services Interaction -- 5.8.Main Challenges and Requirements -- 5.8.1.Challenges -- 5.8.2.Requirements -- 5.9.Summary -- 5.10.Exercises -- References -- 6.Background -- 6.1.Topics Flow -- 6.2.Trusted Computing -- 6.2.1.Introduction -- 6.2.2.Trusted Platform Module -- 6.2.3.TCG Main Components -- 6.2.4.The TP Main Functions -- 6.2.5.Challenges in TCG Specifications -- 6.3.Summary -- References -- 7.Challenges for Establishing Trust in Clouds -- 7.1.Introduction
Formatted contents note 7.2.Effects of Cloud Dynamism on Trust Relationships -- 7.2.1.Load Balancing -- 7.2.2.Horizontal Scaling -- 7.2.3.Vertical Scaling -- 7.2.4.Redundancy -- 7.2.5.Clustering -- 7.3.Challenges -- 7.4.Summary -- 7.5.Exercises -- References -- 8.Establishing Trust in Clouds -- 8.1.Introduction -- 8.2.Organization Requirements -- 8.3.Framework Requirements -- 8.4.Device Properties -- 8.5.Framework Architecture -- 8.5.1.Dynamic Domain Concept -- 8.5.2.Proposed Architecture -- 8.6.Required Software Agents -- 8.6.1.Server Agent Functions -- 8.6.2.Client Agent Functions -- 8.6.3.Server Agent Initialization -- 8.6.4.Client Agent Initialization -- 8.7.Framework Workflow -- 8.7.1.Management Domain and Collaborating Management Domain Establishment -- 8.7.2.Organization Home Domain Establishment -- 8.7.3.Adding Devices to a Domain -- 8.7.4.Outsourced Domain and Collaborating Outsourced Domain Establishment -- 8.8.Discussion and Analysis
Formatted contents note 8.8.1.Benefits of Using Trusted Computing -- 8.8.2.Benefits of the Framework Architecture -- 8.8.3.Content Protection -- 8.9.Summary -- 8.10.Exercises -- References -- 9.Clouds Chains of Trust -- 9.1.Introduction -- 9.2.Software Agents Revision -- 9.3.Roots of and Chains of Trust Definition -- 9.3.1.Roots of Trust -- 9.3.2.Chains of Trust -- 9.4.Intra-layer Chains of Trust -- 9.4.1.A Resource Chain of Trust -- 9.4.2.Compositional Chains of Trust -- 9.4.3.Physical Layer DCoT and CDCoT -- 9.4.4.Virtual Layer DCoT and CDCoT -- 9.4.5.Application Layer DCoT and CDCoT -- 9.5.Trust Across Layers -- 9.6.Summary -- 9.7.Exercises -- References -- 10.Provenance in Clouds -- 10.1.Introduction -- 10.1.1.Log and Provenance -- 10.1.2.Problem Description and Objectives -- 10.1.3.Organization of the Chapter -- 10.2.Motivating Scenarios -- 10.3.Log Records Management and Requirements -- 10.3.1.Database Design -- 10.3.2.Security Requirements
Formatted contents note 10.3.3.Other Requirements and Device Properties -- 10.4.Framework Domain Architecture -- 10.5.Framework Software Agents -- 10.5.1.Cloud Server Agent -- 10.5.2.LaaS Server Agent -- 10.5.3.LaaS Client Agent -- 10.5.4.VM Agent -- 10.5.5.Cloud Client Agent -- 10.6.Framework Workflow -- 10.6.1.Cloud Server Agent Initialization -- 10.6.2.LaaS Server Agent Initialization -- 10.6.3.LCA and CCA Initialization -- 10.6.4.LaaS Domain Establishment -- 10.6.5.Adding Devices to an LaaSD -- 10.6.6.Establishing Trust between Server Agents -- 10.6.7.MD Establishment and Management -- 10.6.8.Secure Log Storage -- 10.7.Threat Analysis -- 10.8.Discussion and Future Directions -- 10.8.1.Establishing Trust -- 10.8.2.Log Retention -- 10.8.3.Achievement of Objectives -- 10.9.Summary -- 10.10.Exercises -- References -- 11.Insiders -- 11.1.Introduction -- 11.2.Insiders Definition -- 11.2.1.Background -- 11.2.2.Definition -- 11.2.3.Rules of Identifying Insiders
Formatted contents note 11.3.Conceptual Models -- 11.3.1.Organizational View -- 11.3.2.Assets and Clients -- 11.3.3.Infrastructure Model -- 11.3.4.Procedure for Identifying Potential and Malicious Insiders -- 11.4.Summary -- 11.5.Exercises -- References -- 12.Real-Life Examples -- 12.1.OpenStack -- 12.1.1.What is OpenStack? -- 12.1.2.Openstack Structure -- 12.1.3.Security in OpenStack -- 12.1.4.OpenStack Configuration Files -- 12.2.Amazon Web Services -- 12.3.Component Architecture -- 12.3.1.Nova-api -- 12.3.2.Nova-database -- 12.3.3.Nova-scheduler -- 12.4.Prototype -- 12.4.1.Trust Attestation via the DC-C -- 12.4.2.Trust Management by the DC-S -- 12.5.Summary -- References -- 13.Case Study -- 13.1.Scenario -- 13.2.Home Healthcare Architecture in the Cloud -- 13.3.Insiders Analysis for Home Healthcare -- 13.3.1.Model Instance -- 13.3.2.Identifying Potential Insiders and Insiders -- 13.3.3.Insider Threat Analysis -- 13.4.Cloud Threats -- References.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing.
Topical term or geographic name as entry element Web services.
Topical term or geographic name as entry element Computer security.
Topical term or geographic name as entry element TECHNOLOGY & ENGINEERING / Telecommunications.
Source of heading or term bisacsh
Topical term or geographic name as entry element Cloud computing.
Source of heading or term fast
Authority record control number (OCoLC)fst01745899
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
Topical term or geographic name as entry element Web services.
Source of heading or term fast
Authority record control number (OCoLC)fst01173242
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Abbadi, Imad M., author.
Title Cloud management and security
Place, publisher, and date of publication Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014
International Standard Book Number 9781118817094
Record control number (DLC) 2014011409
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118817087">http://onlinelibrary.wiley.com/book/10.1002/9781118817087</a>
Public note Wiley Online Library [Free Download only for SUST IP]
938 ## -
-- Ingram Digital eBook Collection
-- IDEB
-- cis28448834
-- EBSCOhost
-- EBSC
-- 787241
-- ebrary
-- EBRY
-- ebr10881234
-- YBP Library Services
-- YANK
-- 11072716
-- Coutts Information Services
-- COUT
-- 28448834
-- YBP Library Services
-- YANK
-- 11864405
-- YBP Library Services
-- YANK
-- 12673393
-- Books 24x7
-- B247
-- bks00072710
-- EBL - Ebook Library
-- EBLB
-- EBL4038902
994 ## -
-- 92
-- DG1

No items available.