PrefaceAcknowledgmentsChapter 1: What is Cloud Computing? 9Why Cloud Computing? 10Cloud Computing's Focus 10Cost Reduction 11Capacity Planning 13Organizational Agility 15How is Cloud Computing Hosted? 16Private Cloud Deployment 16Public Cloud Deployment 17Hybrid Cloud Deployment 17What are the Different Types of Cloud Solutions? 18Software as a Service (SaaS) 18Benefits of SaaS Solutions 19Platform as a Service (PaaS) 19Infrastructure as a Service (IaaS) 21Benefits of IaaS Solutions 23SaaS vs. PaaS vs. IaaS: A Review 23Recovery as a Service (RaaS) 24What are General Benefits of Cloud Services? 25What are General Disadvantages of Cloud Services? 26What is the History Behind Cloud Computing? 26Historic Perspective of Hardware Related to Cloud Computing 29Historic Perspective of Software Related to Cloud Computing 30SOA: A new way of doing old things 31SOA Explained in Terms of Lego Blocks 32Summary of Chapter 1 34References 36Bibliography 36Chapter 2: Who Uses the Cloud? 38Individuals Users 38Public Cloud Subscription Storage for Individuals 40Private Cloud Storage (PCS) for Individuals 41Hosted Personal Cloud Storage Using Third Party Hardware 43Public Cloud vs. Personal Cloud Storage 44Small and Medium Enterprise (SME) Users 46How Can Cloud Computing Save SMEs Money? 46What Cloud Computing Features Appeal to SMEs? 47SME Cloud Software 48Corporate Managers and Users 73Organizational Users of Cloud Computing 74Summary of Chapter 2 75References 76Bibliography 76Website Bibliography 77Accounting Software 77CRM Software 77Data Analytics 77ERP for SMEs 77Help Desk 77HR Software 78Office Software 78Project Management Tools 78Purchasing and Procurement 78Social Media 79Chapter 3: What is Virtualization? 80Hardware Virtualization 81Hypervisors 82Types of Hardware Virtualization 84Hardware Virtualization Vendors and Products 86Hardware Virtualization Benefits 87Operating System Virtualization 88Operating-system-level Virtualization (Containerization) 89Containerization software 90Containers vs. Virtual Machines 92Container Cloud Practices 93Storage Virtualization 94DAS (Direct Attached Storage) 95SAN (Storage Area Networks) 97NAS (Network Attached Storage) 98Storage virtualization techniques 99Summary of Chapter 3 101References 101Bibliography 101Chapter 4: Can the Cloud Help Operations? 103Load Balancing 103Load Balancing Algorithms 105Hardware versus Software Load Balancing 111Cloud-based Balancing 112Cloud Load Balancing versus DNS Load Balancing 113Scalability and Elasticity 114Elasticity in Cloud environments 116Challenges for Elasticity 116Benefits of Cloud Elasticity 119Summary of Chapter 4 123References 124Bibliography 124Chapter 5: How are Clouds Managed? 125Automation 125Orchestration 126Automation Tasks 127Implementing Orchestration with IaC 129IaC Example 131IaC Tools 132Cloud Provider Resource Management 135Access Control for Resource Management Tools 140Customized policies 141APIs and SDKs 141APIs 141SDKs 143SDKs and APIs 143Cloud Backup and Replication 144Cloud Backup 144Cloud Backup Processes 146Cloud Backup Drawbacks 147Cloud Backup Vendors 148Cloud Replication 150Replication Technologies 152DRaaS 152Summary of Chapter 5 154References 155Bibliography 155Website Bibliography 156Backup Providers 156DRaaS Providers 156IaC Providers 157Chapter 6: What are Cloud Business Concerns? 158Monitoring and Console Tools 159Resource Consumption Monitoring 159Planning for Monitoring 160Cloud Monitoring Tools 161Monitoring Challenges 164Cost monitoring 165Costs Associated with Zombie Resource Instances 168Service Level Agreements (SLAs) 171SLA Sources 171SLA Components 172SLA Metrics 173Other Performance considerations 178Performance Failure Penalties 178SLA Data Ownership Clause 179Data Disposition 181Data Breaches 182Governmental Access Requests 183SLA Revisions 183Transferring SLAs 184More on SLAs 184Billing 185Amazon Billing 187Third Party Billing Tools 187Summary of Chapter 6 188References 189Bibliography 189Website Bibliography 190Cost and Monitoring Software 190Zombie Instance Management Software 191Chapter 7: How are Business Applications in the Cloud Managed Safely? 192Cloud Vulnerabilities 192Cloud Security Architecture 193IaaS Security Architecture 194PaaS Security Architecture 198SaaS Security Architecture 201Access and Identity Control in the Cloud 202Identity Governance 204IAM Considerations for Developers 205Identity Provisioning 206Cloud Licenses 207IAM with Third Party Vendors 208Identity and Access Management Products 211Identity Management Standards 213Summary of Chapter 7 217References 218Bibliography 219Website Bibliography 219Identity Management 219Chapter 8: What is Cloud Governance? 221IT Governance Overview 221IT Governance Boards 223IT Governance Frameworks 224IT Governance in the Cloud 232Choosing a Governance Framework 234Cloud Risk Factors Related to Governance 234IT Audit Committees 236IT Auditor 236IT Controls 238End-User Controls 241Shadow IT 243Acceptable Risk 244SOA Governance 245Ensuring Secure Cloud Data 246Cloud Provider Data Safety Measures 247Cloud Encryption 248Symmetric Key Encryption 250Asymmetric Key Encryption 251Other Encryption Methods 254Secure Sockets Layer (SSL) 254Key Management 257Key Management System Products 259Summary of Chapter 8 260References 261Bibliography 261Chapter 9: What other Services Run in the Cloud? 263DevOps 263Cloud-based Problem-Solving Approaches 270Microservices 274Cloud Database Applications 276Cloud Data Models 277Cloud Database Typical Features 279DBaaS Product Examples 279Cloud Analytics Services 282Hadoop 285Hadoop in the Cloud 286Open Source Private Cloud Software 288OpenStack Overview 289OpenStack Components 290Other Services 291Compute Services 291Application Services 292Summary of Chapter 9 292References 293Bibliography 293Website Bibliography 294Data Analytics Tools 294DBaaS 294DevOps 295Hadoop Competitors 295Private Clouds 295Virtual Databases 296Chapter 10: What is the Cloud Future? 297NoOps 297Everything as a Service (EaaS) 298Zero Knowledge Cloud Storage 298Serverless Architecture 299Multicloud 299Small Business Clouds 300Machine Learning 300Internet of Things (IoT) 302Cloud Computing as a Utility 303Cloud Streaming Services 303Edge Computing 303Fog Computing 304Summary of Chapter 10 306References 307Bibliography 308GlossaryIndex
Roger McHaney is a University Distinguished Teaching Scholar and holder of the Daniel D. Burke Chair for Exceptional Faculty in the Department of Management at Kansas State University, USA.