13%
Cloud Computing Design Patterns

Cloud Computing Design Patterns

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

“This book continues the very high standard we have come to expect from ServiceTech Press. The book provides well-explained vendor-agnostic patterns to the challenges of providing or using cloud solutions from PaaS to SaaS. The book is not only a great patterns reference, but also worth reading from cover to cover as the patterns are thought-provoking, drawing out points that you should consider and ask of a potential vendor if you’re adopting a cloud solution.” --Phil Wilkins, Enterprise Integration Architect, Specsavers “Thomas Erl’s text provides a unique and comprehensive perspective on cloud design patterns that is clearly and concisely explained for the technical professional and layman alike. It is an informative, knowledgeable, and powerful insight that may guide cloud experts in achieving extraordinary results based on extraordinary expertise identified in this text. I will use this text as a resource in future cloud designs and architectural considerations.” --Dr. Nancy M. Landreville, CEO/CISO, NML Computer Consulting The Definitive Guide to Cloud Architecture and Design Best-selling service technology author Thomas Erl has brought together the de facto catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, this book’s 100+ patterns illustrate proven solutions to common cloud challenges and requirements. Its patterns are supported by rich, visual documentation, including 300+ diagrams. The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing. This book’s unprecedented technical depth makes it a must-have resource for every cloud technology architect, solution designer, developer, administrator, and manager. Topic Areas Enabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resources Optimizing multitenant environments to efficiently serve multiple unpredictable consumers Using elasticity best practices to scale IT resources transparently and automatically Ensuring runtime reliability, operational resiliency, and automated recovery from any failure Establishing resilient cloud architectures that act as pillars for enterprise cloud solutions Rapidly provisioning cloud storage devices, resources, and data with minimal management effort Enabling customers to configure and operate custom virtual networks in SaaS, PaaS, or IaaS environments Efficiently provisioning resources, monitoring runtimes, and handling day-to-day administration Implementing best-practice security controls for cloud service architectures and cloud storage Securing on-premise Internet access, external cloud connections, and scaled VMs Protecting cloud services against denial-of-service attacks and traffic hijacking Establishing cloud authentication gateways, federated cloud authentication, and cloud key management Providing trust attestation services to customers Monitoring and independently auditing cloud security Solving complex cloud design problems with compound super-patterns

Table of Contents:
Chapter 1: Introduction   1 Objective of This Book   2 What This Book Does Not Cover   2 Who This Book Is For   2 Origin of This Book   3 Recommended Reading   3 How This Book Is Organized   3 Chapter 3: Sharing, Scaling and Elasticity Patterns   4 Chapter 4: Reliability, Resiliency and Recovery Patterns   4 Chapter 5: Data Management and Storage Device Patterns   4 Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns   4 Chapter 7: Monitoring, Provisioning and Administration Patterns   4 Chapter 8: Cloud Service and Storage Security Patterns   4 Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns   4 Chapter 10: Common Compound Patterns   5 Appendix A: Cloud Computing Mechanisms Glossary   5 Appendix B: Alphabetical Design Patterns Reference   5 Additional Information   5 Symbol Legend   5 Pattern Documentation Conventions   5 Updates, Errata, and Resources (www.servicetechbooks.com)    6 Cloud Computing Design Patterns (www.cloudpatterns.org)    6 What Is Cloud? (www.whatiscloud.com)    6 Referenced Specifications (www.servicetechspecs.com)    6 The Service Technology Magazine (www.servicetechmag.com)    6 CloudSchool.com Certified Cloud (CCP) Professional (www.cloudschool.com)    6 Social Media and Notification   7 Chapter 2: Understanding Design Patterns   9 About Pattern Profiles   11 Requirement   11 Icon   11 Problem    11 Solution   12 Application   12 Mechanisms   12 About Compound Patterns   12 Design Pattern Notation   13 Capitalization   13 Page Number References   13 Measures of Design Pattern Application   13 Working with This Catalog   14 Chapter 3: Sharing, Scaling and Elasticity Patterns   15 Shared Resources   17 Problem   17 Solution   18 Application   19 Mechanisms   21 Workload Distribution   22 Problem   22 Solution   22 Application   22 Mechanisms   24 Dynamic Scalability   25 Problem   25 Solution   27 Application   28 Mechanisms   31 Service Load Balancing   32 Problem   32 Solution   33 Application   34 Mechanisms   36 Elastic Resource Capacity   37 Problem   37 Solution   37 Application   38 Mechanisms   40 Elastic Network Capacity   42 Problem   42 Solution   43 Application   43 Mechanisms   43 Elastic Disk Provisioning   45 Problem   45 Solution   46 Application   48 Mechanisms   49 Load Balanced Virtual Server Instances   51 Problem   51 Solution   52 Application   53 Mechanisms   55 Load Balanced Virtual Switches   57 Problem   57 Solution   58 Application   58 Mechanisms   60 Service State Management   61 Problem   61 Solution   61 Application   62 Mechanisms   63 Storage Workload Management   64 Problem   64 Solution   64 Application   66 Mechanisms   69 Dynamic Data Normalization   71 Problem   71 Solution   72 Application   72 Mechanisms   73 Cross-Storage Device Vertical Tiering   74 Problem   74 Solution   76 Application   76 Mechanisms   79 Intra-Storage Device Vertical Data Tiering   81 Problem   81 Solution   81 Application   82 Mechanisms   85 Memory Over-Committing   86 Problem   86 Solution   87 Application   88 Mechanisms   89 NIC Teaming   90 Problem   90 Solution   90 Application   91 Mechanisms   92 Broad Access   93 Problem   93 Solution   93 Application   94 Mechanisms   94 Chapter 4: Reliability, Resiliency and Recovery Patterns   97 Resource Pooling   99 Problem   99 Solution   99 Application   100 Mechanisms   103 Resource Reservation   106 Problem   106 Solution   107 Application   107 Mechanisms   110 Hypervisor Clustering   112 Problem   112 Solution   112 Application   114 Mechanisms   117 Redundant Storage   119 Problem   119 Solution   121 Application   121 Mechanisms   122 Dynamic Failure Detection and Recovery   123 Problem   123 Solution   123 Application   123 Mechanisms   126 Multipath Resource Access   127 Problem   127 Solution   128 Application   129 Mechanisms   131 Redundant Physical Connection for Virtual Servers   132 Problem   132 Solution   133 Application   134 Mechanisms   136 Synchronized Operating State   138 Problem   138 Solution   138 Application   139 Mechanisms   142 Zero Downtime   143 Problem   143 Solution   143 Application   144 Mechanisms   144 Storage Maintenance Window   147 Problem   147 Solution   148 Application   148 Mechanisms   154 Virtual Server Auto Crash Recovery 155 Problem   155 Solution   156 Application   157 Mechanisms   158 Non-Disruptive Service Relocation   159 Problem   159 Solution   160 Application   160 Mechanisms   164 Chapter 5: Data Management and Storage Device Patterns   167 Direct I/O Access   169 Problem   169 Solution   169 Application   169 Mechanisms   171 Direct LUN Access   173 Problem   173 Solution   174 Application   174 Mechanisms   176 Single Root I/O Virtualization   178 Problem   178 Solution   179 Application   179 Mechanisms   180 Cloud Storage Data at Rest Encryption   181 Problem   181 Solution   182 Application   182 Mechanisms   183 Cloud Storage Data Lifecycle Management   184 Problem   184 Solution   185 Application   185 Mechanisms   186 Cloud Storage Data Management   187 Problem   187 Solution   188 Application   188 Mechanisms   189 Cloud Storage Data Placement Compliance Check   190 Problem   190 Solution   191 Application   191 Mechanisms   192 Cloud Storage Device Masking   194 Problem   194 Solution   194 Application   195 Mechanisms   197 Cloud Storage Device Path Masking   198 Problem   198 Solution   198 Application   199 Mechanisms   200 Cloud Storage Device Performance Enforcement   201 Problem   201 Solution   202 Application   202 Mechanisms   203 Virtual Disk Splitting   204 Problem   204 Solution   205 Application   206 Mechanisms   209 Sub-LUN Tiering   210 Problem   210 Solution   210 Application   211 Mechanisms   213 RAID-Based Data Placement   214 Problem   214 Solution   214 Application   215 Mechanisms   217 IP Storage Isolation   218 Problem   218 Solution   218 Application   218 Mechanisms   220 Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns   221 Virtual Server Folder Migration   223 Problem   223 Solution   225 Application   225 Mechanisms   226 Persistent Virtual Network Configuration   227 Problem   227 Solution   227 Application   228 Mechanisms   229 Virtual Server Connectivity Isolation   231 Problem   231 Solution   232 Application   233 Mechanisms   234 Virtual Switch Isolation   235 Problem   235 Solution   236 Application   236 Mechanisms   238 Virtual Server NAT Connectivity   240 Problem   240 Solution   240 Application   240 Mechanisms   243 External Virtual Server Accessibility   244 Problem   244 Solution   245 Application   245 Mechanisms   246 Cross-Hypervisor Workload Mobility   247 Problem   247 Solution   248 Application   250 Mechanisms   250 Virtual Server-to-Host Affinity   252 Problem   252 Solution   253 Application   254 Mechanisms   257 Virtual Server-to-Host Anti-Affinity   258 Problem   258 Solution   261 Application 261 Mechanisms 264 Virtual Server-to-Host Connectivity   265 Problem   265 Solution   266 Application   266 Mechanisms   266 Virtual Server-to-Virtual Server Affinity   267 Problem   267 Solution   269 Application   269 Mechanisms   271 Virtual Server-to-Virtual Server Anti-Affinity   272 Problem   272 Solution   275 Application   275 Mechanisms   277 Stateless Hypervisor   278 Problem   278 Solution   278 Application   279 Mechanisms   282 Chapter 7: Monitoring, Provisioning and Administration Patterns   283 Usage Monitoring   285 Problem   285 Solution   285 Application   286 Mechanisms   287 Pay-as-You-Go   288 Problem   288 Solution   288 Application   289 Mechanisms   291 Realtime Resource Availability   292 Problem   292 Solution   292 Application   293 Mechanisms   294 Rapid Provisioning   295 Problem   295 Solution   296 Application   296 Mechanisms   299 Platform Provisioning   301 Problem   301 Solution   301 Application   302 Mechanisms   304 Bare-Metal Provisioning   305 Problem   305 Solution   305 Application   305 Mechanisms   308 Automated Administration   310 Problem   310 Solution   310 Application   311 Mechanisms   314 Centralized Remote Administration   315 Problem   315 Solution   317 Application   317 Mechanisms   318 Resource Management   320 Problem   320 Solution   320 Application   321 Mechanisms   323 Self-Provisioning   324 Problem   324 Solution   325 Application   325 Mechanisms   329 Power Consumption Reduction   330 Problem   330 Solution   330 Application   331 Mechanisms   334 Chapter 8: Cloud Service and Storage Security Patterns   335 Trusted Platform BIOS   337 Problem   337 Solution   338 Application   339 Mechanisms   340 Geotagging   341 Problem   341 Solution   341 Application   342 Mechanisms   343 Hypervisor Protection   344 Problem   344 Solution   346 Application   347 Mechanisms   349 Cloud VM Platform Encryption   350 Problem   350 Solution   350 Application   352 Mechanisms   353 Trusted Cloud Resource Pools   354 Problem   354 Solution   354 Application   356 Mechanisms   358 Secure Cloud Interfaces and APIs   360 Problem   360 Solution   361 Application   361 Mechanisms   363 Cloud Resource Access Control   364 Problem   364 Solution   366 Application   368 Mechanisms   368 Detecting and Mitigating User-Installed VMs   369 Problem   369 Solution   371 Application   372 Mechanisms   374 Mobile BYOD Security   376 Problem   376 Solution   378 Application   380 Mechanisms   381 Cloud Data Breach Protection   382 Problem   382 Solution   384 Application   384 Mechanisms   386 Permanent Data Loss Protection   387 Problem   387 Solution   388 Application   389 Mechanisms   390 In-Transit Cloud Data Encryption   391 Problem   391 Solution   391 Application   392 Mechanisms   394 Chapter 9: Network Security, Identity & Access Management and Trust Assurance Patterns   395 Secure On-Premise Internet Access   397 Problem   397 Solution   398 Application   400 Mechanisms   403 Secure External Cloud Connection   404 Problem   404 Solution   404 Application   405 Mechanisms   408 Secure Connection for Scaled VMs   409 Problem   409 Solution   412 Application   414 Mechanisms   415 Cloud Denial-of-Service Protection   416 Problem   416 Solution   418 Application   419 Mechanisms   420 Cloud Traffic Hijacking Protection   421 Problem   421 Solution   423 Application   423 Mechanisms   424 Automatically Defined Perimeter   425 Problem   425 Solution   426 Application   427 Mechanisms   429 Cloud Authentication Gateway   430 Problem   430 Solution   431 Application   432 Mechanisms   435 Federated Cloud Authentication   436 Problem   436 Solution   438 Application   439 Mechanisms   443 Cloud Key Management   444 Problem   444 Solution   445 Application   446 Mechanisms   447 Trust Attestation Service   448 Problem   448 Solution   449 Application   449 Mechanisms   451 Collaborative Monitoring and Logging   452 Problem   452 Solution   455 Application   455 Mechanisms   459 Independent Cloud Auditing   460 Problem   460 Solution   461 Application   463 Mechanisms   464 Threat Intelligence Processing   465 Problem   465 Solution   466 Application   468 Mechanisms   469 Chapter 10: Common Compound Patterns   471 “Compound Pattern” vs. “Composite Pattern”    472 Compound Pattern Members   472 Joint Application vs. Coexistent Application   472 Private Cloud   474 Public Cloud   476 Software-as-a-Service (SaaS)    478 Platform-as-a-Service (PaaS)    480 Infrastructure-as-a-Service (IaaS)    482 Elastic Environment    484 Multitenant Environment   486 Resilient Environment   490 Cloud Bursting   492 Burst Out to Private Cloud   493 Burst Out to Public Cloud   496 Burst In   499 Secure Burst Out to Private Cloud/Public Cloud   501 Cloud Balancing   503 Cloud Authentication   505 Resource Workload Management   506 Isolated Trust Boundary   508 Appendix A: Cloud Computing Mechanisms Glossary   511 Appendix B: Alphabetical Design Patterns Reference   535 About the Authors   541 Index   543


Best Sellers


Product Details
  • ISBN-13: 9780133858563
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Prentice Hall
  • Depth: 38
  • Language: English
  • Returnable: N
  • Spine Width: 36 mm
  • Width: 188 mm
  • ISBN-10: 0133858561
  • Publisher Date: 18 Jun 2015
  • Binding: Hardback
  • Height: 236 mm
  • No of Pages: 592
  • Series Title: Prentice Hall Service Technology
  • Weight: 1072 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cloud Computing Design Patterns
Pearson Education (US) -
Cloud Computing Design Patterns
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cloud Computing Design Patterns

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA