Cargando…

Cloud computing and virtualization /

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Le, Dac-Nhuong, 1983- (Editor ), Kumar, Raghvendra, 1987- (Editor ), Nguyen, Nhu Gia (Editor ), Chatterjee, Jyotir Moy (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : Beverly, MA : John Wiley & Sons ; Scrivener Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1028553229
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 180702s2018 nju ob 001 0 eng
010 |a  2018031768 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d N$T  |d DG1  |d CNCGM  |d YDX  |d OCLCF  |d RECBK  |d MERER  |d UAB  |d UPM  |d TEFOD  |d COO  |d NLE  |d EBLCP  |d SNM  |d U3W  |d DLC  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCQ  |d UX1  |d VT2  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1028954973  |a 1029428551  |a 1030254826  |a 1041508014  |a 1175630699  |a 1181900300  |a 1228593424 
020 |a 9781119488088  |q (epub) 
020 |a 1119488087 
020 |a 9781119488125  |q (pdf) 
020 |a 1119488125 
020 |a 9781119488149 
020 |a 1119488141 
020 |a 1119487900 
020 |a 9781119487906 
020 |z 9781119487906  |q (cloth) 
029 1 |a AU@  |b 000063580345 
029 1 |a CHNEW  |b 001003198 
029 1 |a CHVBK  |b 516429035 
029 1 |a GBVCP  |b 1018229485 
029 1 |a AU@  |b 000067301818 
029 1 |a AU@  |b 000068443251 
035 |a (OCoLC)1028553229  |z (OCoLC)1028954973  |z (OCoLC)1029428551  |z (OCoLC)1030254826  |z (OCoLC)1041508014  |z (OCoLC)1175630699  |z (OCoLC)1181900300  |z (OCoLC)1228593424 
037 |a 8D8110B2-146A-45F0-B45C-3E360F0DFF32  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 0 0 |a QA76.9.V5 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 0 |a 004.67/82  |2 23 
049 |a UAMI 
245 0 0 |a Cloud computing and virtualization /  |c edited by Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons ;  |a Beverly, MA :  |b Scrivener Publishing,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record and CIP data provided by publisherd. 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References. 
505 8 |a Chapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration. 
505 8 |a 5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References. 
505 8 |a Chapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security. 
505 8 |a 8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time. 
520 |a The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Virtual computer systems  |x Security measures. 
650 0 |a Cloud computing. 
650 6 |a Systèmes virtuels (Informatique)  |x Sécurité  |x Mesures. 
650 6 |a Infonuagique. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Cloud computing  |2 fast 
650 7 |a Virtual computer systems  |2 fast 
700 1 |a Le, Dac-Nhuong,  |d 1983-  |e editor. 
700 1 |a Kumar, Raghvendra,  |d 1987-  |e editor. 
700 1 |a Nguyen, Nhu Gia,  |e editor. 
700 1 |a Chatterjee, Jyotir Moy,  |e editor. 
758 |i has work:  |a Cloud computing and virtualization (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGPFmVwqBpWC7g6PwQHCpP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Cloud computing and virtualization.  |d Hoboken, NJ : John Wiley & Sons ; Beverly, MA : Scrivener Publishing, 2018  |z 9781119487906  |w (DLC) 2018007565 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5320954  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5320954 
938 |a EBSCOhost  |b EBSC  |n 1729312 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00722579 
938 |a YBP Library Services  |b YANK  |n 15247263 
938 |a YBP Library Services  |b YANK  |n 15318140 
994 |a 92  |b IZTAP