Is “provisioning a web server in 5 minutes for $5” the most
interesting thing about the cloud?
Those responsible for IT in their enterprise are quickly
discovering that the cloud is a game-changing trend that
offers a completely new methodology for service provision.
The cloud not only lets you cut IT costs and be greener—it
also accelerates innovation within your enterprise. These are
the values driving architects to look at how they can build a
private cloud for their enterprise.
We are at the start of a decade where network designers will
use infrastructure consolidation and virtualization to create
next-generation cloud services. Network virtualization is the
bedrock for this solution because it can consolidate diverse
networks into a single virtual entity, the first step in creating a
service-oriented infrastructure. On this foundation, IT
resources can be scaled up and down virtually to provision
on-demand services (a.k.a. private cloud services) without the
addition of new physical devices or entities through server
virtualization. From a business perspective, this enables cost
savings and increases the ability to rapidly react and adjust to
the volatile business climate. This enables more agile
balancing of expense reduction with business growth
Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.
Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment model
Provides an overview of cloud security and cloud management from the server virtualization perspective
Presents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environment
Offers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation
Microsoft Private Cloud Computing
Learn the foundation of cloud computing and how to build your own Microsoft private cloud
Written by a team of expert authors who are MVPs and leaders in their respective fields, this one-of-a-kind book is an essential resource for IT administrators who are responsible for implementing and managing a cloud infrastructure....
Cloud Computing, A Practical Approach
"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters
A Down-to-Earth Guide to Cloud Computing
Cloud Computing: A Practical Approach provides...
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Well-known security experts decipher the most challenging aspect of cloud computing-security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...
Security Assessment: Case Studies for Implementing the NSA IAM The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... Network Security Auditing (Networking Technology: Security)
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick...