Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the "why's and how's" of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture and https protocol. Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud; Describes for IT managers how to improve their Cloud Computing infrastructures; Includes coverage of security concerns with Cloud operating models; Uses several case studies to illustrate the "why's and how's" of using the Cloud; Examples and options to improve Cloud Computing Scalability.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the "why's and how's" of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architecture, with focus on best practices for using a dynamic cloud infrastructure, cloud operations management and cloud security. The authors explain carefully the "why's and how's" of Cloud Computing, so engineers will find this book and invaluable introduction to the topic.
|
You may like...
|