Security Management in Mobile Cloud Computing (Advances in Information Security, Privacy, and Ethics)
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigatin...
Cloud Computing Technologies for Green Enterprises (Advances in Business Information Systems and Analytics)
Emerging developments in cloud computing have created novel opportunities and applications for businesses. These innovations not only have organizational benefits, but can be advantageous for green enterprises as well. Cloud Computing Technologies for Green Enterprises is a pivotal reference source for the latest scholarly research on the advancements, benefits, and challenges of cloud computing for green enterprise endeavors. Highlighting pertinent topics such as resource allocation, energy eff...
Future Connected Technologies
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing. The book covers not only the cloud, but also other pertinent topics such as Machine Learning, Deep Learning, IoT and Fog/Edge Computing. The last section of the book mainly focuses on the...
Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the...
Research Anthology on Edge Computing Protocols, Applications, and Integration
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative te...
Architecture and Security Issues in Fog Computing Applications (Advances in Computer and Electrical Engineering)
As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses m...
ICT technologies have contributed to the advances in wireless systems, which provide seamless connectivity for worldwide communication. The growth of interconnected devices and the need to store, manage, and process the data from them has led to increased research on the intersection of the internet of things and cloud computing. The Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization is a pivotal reference source that provides the latest research findings and so...
Advanced Deep Learning Applications in Big Data Analytics (Advances in Data Mining and Database Management)
Interest in big data has swelled within the scholarly community as has increased attention to the internet of things (IoT). Algorithms are constructed in order to parse and analyze all this data to facilitate the exchange of information. However, big data has suffered from problems in connectivity, scalability, and privacy since its birth. The application of deep learning algorithms has helped process those challenges and remains a major issue in today’s digital world. Advanced Deep Learning App...
Run Ansible playbooks to launch complex multi-tier applications hosted in public clouds About This Book • Build your learning curve using Ansible • Automate cloud, network, and security infrastructures with ease • Gain hands-on exposure on Ansible Who This Book Is For Learn Ansible is perfect for system administrators and developers who want to take their current workflows and transform them into repeatable playbooks using Ansible. No prior knowledge of Ansible is required. What You Will Le...
IT Security Risk Management in the Context of Cloud Computing
by Andre Loske
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates th...
Advances in Mobile Cloud Computing Systems
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chap...
Prepare for success on the AWS SysOps exam, your next job interview, and in the field with this handy and practical guide The newly updated Third Edition of AWS Certified SysOps Administrator Study Guide: Associate (SOA-C02) Exam prepares you for the Amazon Web Services SysOps Administrator certification and a career in the deployment, management, and operation of an AWS environment. Whether you’re preparing for your first attempt at the challenging SOA-C02 Exam, or you want to upgrade your AW...
Cloud Computing & Virtualization
by R Rajeswara Rao and V Subba Ramaiah
Cloud Data Center Network Architectures and Technologies
by Lei Zhang and Le Chen
Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical...
Start from scratch and develop the essential skills needed to create, deploy, and manage cloud-native applications using Docker Key Features • Get a solid understanding of Docker and containers • Overcome common problems while containerizing an application • Master Docker commands needed for creating, deploying, and running applications Book Description Most applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on. Having...
Over 100 effective recipes to help you design, implement, and manage the software-defined and massively scalable Ceph storage system About This Book • Implement a Ceph cluster successfully and gain deep insights into its best practices • Harness the abilities of experienced storage administrators and architects, and run your own software-defined storage system • This comprehensive, step-by-step guide will show you how to build and manage Ceph storage in production environment Who This Book Is...
Regardless of where your organization is in your cloud journey, moving to the cloud is an inevitability in the coming years. The cloud is here to stay, and now is the best time to identify optimal strategies to harness the benefits and mitigate the risks. Cloud Computing Basics is the practical, accessible entry point you have been seeking.Get an introduction to the basics of cloud computing and all five major cloud platforms. Author Anders Lisdorf ensures that you gain a fundamental cloud vocab...
Implementing Microsoft Azure Infrastructure Solutions: Exam Guide 70-533
by Melony QIN
Develop skills and knowledge for provisioning and managing services in Microsoft Azure and implement infrastructure components Key Features Build and manage robust infrastructure solutions on Microsoft Azure Plan and implement Azure storage, backup, and recovery services Prepare and boost your confidence with certification-based mock tests and solutions Book Description Microsoft Azure is a prominent public cloud provider, recording the highest user base growth in the year 2017. Microsoft has pr...
Building RESTful Web Services with Spring 5
by Raja CSP Raman and Ludovic Dewailly
Find out how to implement the REST architecture to build resilient software in Java with the help of the Spring 5.0 framework. Key Features Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service. Leverage the Spring Framework to quickly implement RESTful endpoints. Learn to implement a client library for a RESTful web service using the Spring Framework along with the new front end framework.Book DescriptionREST is an architectural...