新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
Enabling the New Era of Cloud Computing : Data Security, Transfer, and Management
发布日期:2015-12-10  浏览

Enabling the New Era of Cloud Computing : Data Security, Transfer, and Management

[Book Description]

Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future.

[Table of Contents]
 
Foreword                                           xi
          Howard A. Schmidt
Foreword                                           xiii
          Aloysius Cheang
Preface                                            xv
Acknowledgment                                     xxii
  Section 1 Cloud Computing Overview
    Chapter 1 Cloud Computing Overview             1   (24)
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      The History of Cloud Computing               1   (2)
      Cloud Computing Models                       3   (4)
      The Wave of Cloud Transformation in the      7   (11)
      Global Information Industry
      Exploring the Cloud Era Market Demand        18  (6)
      Conclusion                                   24  (1)
    Chapter 2 Main Components of Cloud Computing   25  (26)
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Cloud Era Information Hub                    25  (5)
      Cloud Era Communication Networks             30  (6)
      Intelligent Terminals of the Cloud Era       36  (5)
      Cloud Computing and the Internet of Things   41  (8)
      Conclusions and Looking to the Future        49  (2)
    Chapter 3 Cloud Infrastructure:                51  (27)
    Virtualization
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Virtualization Overview                      51  (1)
      Virtualization Processes                     52  (1)
      Server Virtualization                        53  (8)
      Storage Virtualization                       61  (5)
      Network Virtualization                       66  (6)
      Desktop Virtualization                       72  (6)
  Section 2 Data Management and Data Security
    Chapter 4 Trusted Cloud Initiative             78  (16)
    Reference Architecture
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Overview of the Reference Architecture       78  (1)
      How to Use the TCI Reference Architecture    79  (1)
      Security and Risk Management: Protecting     80  (3)
      Data and Managing Risk
      Relationships to Other Domains               83  (2)
      Business Operation Support Services:         85  (3)
      Partners with the Business
      Technology Solution Domains                  88  (6)
    Chapter 5 Security Information and Event       94  (22)
    Management Implementation Guidance
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Overview                                     95  (1)
      Requirements                                 96  (6)
      Architectural Implementation                 102 (4)
      Technical Implementation                     106 (10)
    Chapter 6 Enterprise Security Monitoring       116 (16)
    with the Fusion Center Model
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Emerging Threats: Advanced Attacks           116 (1)
      Problems in Defense: Inadequate              117 (3)
      Actionable Information and Organizational
      Silos
      Countermeasure Solutions: Cross-Boundary     120 (3)
      Enterprise Monitoring
      Monitoring Information Sharing               123 (2)
      Vision: Global Correlation and               125 (5)
      Intelligence
      Conclusion                                   130 (2)
    Chapter 7 Data Protection in the Cloud Era     132 (24)
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 132 (2)
      Understanding the Problem                    134 (6)
      The Vision: Where We Want to Be              140 (1)
      The Strategy: How We Get There               141 (12)
      Next Steps: Considerations for Reference     153 (3)
      Architecture
  Section 3 Data Storage and Big Data
    Chapter 8 Big Data Overview                    156 (29)
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 156 (1)
      Big Data Definition                          157 (1)
      Big Data Characteristics                     158 (1)
      Big Data Value                               159 (2)
      Big Data Structure                           161 (4)
      Big Data Analytics                           165 (6)
      The Big Data Ecosystem                       171 (14)
    Chapter 9 Big Data Techniques, Tools, and      185 (29)
    Applications
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 185 (1)
      Big Data Technologies                        186 (12)
      Big Data Applications                        198 (7)
      Big Data Services                            205 (9)
  Section 4 Networking in the Cloud Era
    Chapter 10 Cloud Computing Networks:           214 (12)
    Utilizing the Content Delivery Network
          Yale Li
          Yushi Shen
          Yudong Liu
      Cloud Computing Overview                     214 (1)
      Opportunities and Challenges of Cloud        215 (3)
      Computing
      Akamai CDN Technology                        218 (1)
      CDN Evaluation in the Microsoft Cloud        219 (4)
      Future Improvements for the Cloud CDN        223 (1)
      Conclusion                                   224 (2)
    Chapter 11 Data Transfer and Storage in        226 (12)
    Cloud Computing
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 226 (3)
      Related Works                                229 (9)
    Chapter 12 Parallel Data Transfer Protocol     238 (18)
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 239 (1)
      Forward Error Correction                     240 (1)
      Parallel Data Transfer Challenges            241 (1)
      CSTP: Cross-Stream Transfer Protocol         242 (5)
      CSTP Implementation                          247 (3)
      Scale CSTP to Large Number of Streams        250 (3)
      Conclusion                                   253 (3)
    Chapter 13 Border Adaptive                     256 (13)
    Micro-Base-Station for Wireless
    Communications
          Henry Gao
          Yushi Shen
      Introduction                                 256 (2)
      Ultimate Goal of Wireless Telecom: To        258 (1)
      Provide Homogenous Service Level
      Comparable to the Wired Network
      Understanding of the Shannon Theory from     259 (2)
      a New Angle
      Enhancing the Micro-Base-Station             261 (1)
      Principle to the Extreme
      Centralized Time Division Multiple Access    262 (3)
      (CTDMA)
      Part-Time Wireless Network Operators         265 (1)
      Uninterrupted Wireless Communication         265 (1)
      Services During Catastrophes
      Conclusion                                   266 (3)
  Section 5 Appendix
    Chapter 14 Impact of Cultural Differences      269 (15)
    on the Cloud Computing Ecosystems in the
    USA and China
          Yushi Shen
          Jie Yang
          Tayfun Keskin
      Introduction                                 270 (1)
      Cloud Computing                              270 (2)
      Cultural Influences on Information           272 (1)
      Technology (IT)
      Cultural Differences Between The U.S. and    273 (3)
      China and their Impact on Cloud Computing
      Methodology                                  276 (1)
      Results                                      277 (3)
      Supporting Questions Around Culture          280 (2)
      Dimensions
      Analysis                                     282 (1)
      Conclusion                                   282 (2)
    Chapter 15 Cloud Strategy Leads Innovation     284 (6)
    in China
          Yushi Shen
          Yale Li
          Ling Wu
          Shaofeng Liu
          Qian Wen
      Introduction                                 284 (1)
      A New Generation of E-Government Platform    285 (2)
      Micro-Entrepreneurship and Civilian          287 (1)
      Innovation
      Conclusion and Outlook                       288 (2)
Compilation of References                          290 (17)
About the Contributors                             307 (3)
Index                                              310

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上