LEADER 03888nam 2200445 450 001 9910153234503321 005 20170109010808.0 035 $a(CKB)3710000000951456 035 $a(MiAaPQ)EBC4747075 035 $a(CaSebORM)9781786464231 035 $a(PPN)220202443 035 $a(EXLCZ)993710000000951456 100 $a20170301h20162016 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aLearning ansible 2 $elearn everything you need to manage and handle your systems with ease with Ansible 2 using this comprehensive guide /$fFabio Alessandro Locati 205 $aSecond edition. 210 1$aBirmingham, England ;$aMumbai, [India] :$cPackt Publishing,$d2016. 210 4$d©2016 215 $a1 online resource (256 pages) 300 $aIncludes index. 311 $a1-78646-423-3 311 $a1-78646-209-5 330 $aLearn everything you need to manage and handle your systems with ease with Ansible 2 using this comprehensive guide About This Book Simplify the automation of applications and systems using the newest version of Ansible Get acquainted with fundamentals of Ansible such as playbooks, modules, and various testing strategies A comprehensive, learning guide that provides you with great skills to automate your organization?s infrastructure using Ansible 2 Who This Book Is For The book is for sys admins who want to automate their organization?s infrastructure using Ansible 2. No prior knowledge of Ansible is required. What You Will Learn Set up Ansible 2 and an Ansible 2 project in a future-proof way Perform basic operations with Ansible 2 such as creating, copying, moving, changing, and deleting files, and creating and deleting users Deploy complete cloud environments using Ansible 2 on AWS and DigitalOcean Explore complex operations with Ansible 2 (Ansible vault, e-mails, and Nagios) Develop and test Ansible playbooks Write a custom module and test it In Detail Ansible is an open source automation platform that assists organizations with tasks such as configuration management, application deployment, orchestration, and task automation. With Ansible, even complex tasks can be handled easier than before. In this book, you will learn about the fundamentals and practical aspects of Ansible 2 by diving deeply into topics such as installation (Linux, BSD, and Windows Support), playbooks, modules, various testing strategies, provisioning, deployment, and orchestration. In this book, you will get accustomed with the new features of Ansible 2 such as cleaner architecture, task blocks, playbook parsing, new execution strategy plugins, and modules. You will also learn how to integrate Ansible with cloud platforms such as AWS. The book ends with the enterprise versions of Ansible, Ansible Tower and Ansible Galaxy, where you will learn to interact Ansible with different OSes to speed up your work to previously unseen levels By the end of the book, you?ll able to leverage the Ansible parameters to create expeditious tasks for your organization by implementing the Ansible 2 techniques and paradigms. Style and approach This book is a step-by-step learning guide on the all new Ansible 2, which is an ideal configuration management tool. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from you... 606 $aInformation technology$xAutomation 606 $aInformation technology$xManagement 615 0$aInformation technology$xAutomation. 615 0$aInformation technology$xManagement. 676 $a004 700 $aLocati$b Fabio Alessandro$01234844 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910153234503321 996 $aLearning ansible 2$92868548 997 $aUNINA LEADER 12782oam 22006251 450 001 9910971250503321 005 20251116200823.0 010 $a1-00-302569-2 010 $a1-000-21462-1 010 $a1-003-02569-2 010 $a1-000-21446-X 024 7 $a10.1201/9781003025696 035 $a(MiAaPQ)EBC6357308 035 $a(OCoLC)1202859102$z(OCoLC)1223026816 035 $a(OCoLC-P)1202859102 035 $a(FlBoTFG)9781003025696 035 $a(CKB)4100000011470166 035 $a(EXLCZ)994100000011470166 100 $a20200914d2021 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aApplications of cloud computing $eapproaches and practices /$fedited by Prerna Sharma, Moolchand Sharma, Mohamed Elhoseny 205 $aFirst edition. 210 1$aBoca Raton :$cChapman & Hall/CRC,$d2021. 215 $a1 recurso en línea (210 pages)$cil., gráf. y tablas 225 0 $aChapman & Hall/CRC distributed sensing and intelligent systems series 311 08$a0-367-56882-9 311 08$a0-367-90412-8 320 $aIncluye bibliografía e índice. 327 $aCover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Tables and Figures -- Preface -- Editors -- Contributors -- About This Book -- Chapter 1: Analysis of Biological Information Using Statistical Techniques in Cloud Computing -- 1.1 What Is Bioinformatics? -- 1.1.1 A Brief History -- 1.1.2 Tools and Techniques -- 1.1.3 Future Scope -- 1.2 Cloud Analytics -- 1.2.1 Analytic Services -- 1.2.2 Bioinformatics Cloud -- 1.3 Bioinformatics Cloud Computing Services -- 1.3.1 Data as a Service (DaaS) -- 1.3.1.1 EMBOSS -- 1.3.1.2 J-GLOBAL -- 1.3.1.3 Gene Set Builder -- 1.3.1.4 BioDWH -- 1.3.1.5 AWS Public Datasets -- 1.3.1.6 SeqHound -- 1.3.2 Software as a Service (SaaS) -- 1.3.2.1 Lhasa Cloud -- 1.3.2.2 eCEO -- 1.3.2.3 StormSeq -- 1.3.2.4 Crossbow -- 1.3.2.5 CloudBurst -- 1.3.3 Platform as a Service (PaaS) -- 1.3.3.1 DNAnexus -- 1.3.3.2 Magallanes -- 1.3.3.3 Google Genomics -- 1.3.3.4 Syapse -- 1.3.3.5 BioServices -- 1.3.3.6 Eoulsan -- 1.3.4 Infrastructure as a Service (IaaS) -- 1.3.4.1 Google Compute Engine -- 1.3.4.2 GoGrid -- 1.3.4.3 HP Helion -- 1.3.4.4 Joyent -- 1.4 CSIM Architecture -- 1.5 Implementation Challenges -- 1.5.1 Security and Privacy -- 1.5.2 Legal Aspects -- References -- Chapter 2: Intelligent Cloud Computing and Bioinformatics Data Analysis -- 2.1 Introduction -- 2.1.1 Introduction to Intelligent Cloud Computing -- 2.1.2 Contemporary Advancements in Bioinformatics Data Analysis -- 2.1.3 Reasons for the Use of Intelligent Cloud Computing in Bioinformatics -- 2.1.4 Terminology and Abbreviations -- 2.2 Principal Disciplines of Intelligent Cloud Computing and Bioinformatics Data Analysis -- 2.2.1 Intelligent Cloud Computing Architecture -- 2.2.2 Current Frameworks in Bioinformatics Data Analysis -- 2.2.2.1 MapReduce with Hadoop for Big Data Analysis. 327 $a2.2.2.2 Applications of Service Models -- 2.2.2.3 Cloud Developments in Translational Biomedical Sciences -- 2.3 Bioinformatics Data Analysis Methodologies Compared -- 2.3.1 AiNET (Artificial Immune NETwork) -- 2.3.2 Microarray Data Analysis -- 2.4 Challenges and Opportunities -- 2.4.1 Technical Challenges and Scope for Improvement -- 2.4.1.1 Workload Factoring -- 2.4.1.2 Network Bandwidth -- 2.4.1.3 Heterogeneous Distributed Database System -- 2.4.2 Implementations and Applications -- 2.5 Further Advancements -- 2.6 Conclusion -- References -- Chapter 3: Cloud Computing Service Models: Traditional and User-Centric Approaches -- 3.1 Introduction -- 3.2 Traditional Cloud Computing Service Models -- 3.2.1 Types of Traditional Cloud Computing Service Models -- 3.2.1.1 Infrastructure as a Service -- 3.2.1.2 Platform as a Service -- 3.2.1.3 Software as a Service -- 3.2.2 Security Issues in Traditional Cloud Computing Service Models -- 3.2.2.1 Security Problems of SaaS -- 3.2.2.2 Security Problems of PaaS -- 3.2.2.3 Security Problems of IaaS -- 3.2.2.4 Current Security Solutions -- 3.2.3 Summary -- 3.3 A User-Centric Approach to a Mobile Cloud Computing Service Model -- 3.3.1 Current Mobile Cloud Services Models -- 3.3.2 Existing Mobile Cloud Applications -- 3.3.2.1 Mobile Cloud's Computational Task -- 3.3.2.2 Mobile Cloud Storage -- 3.3.2.3 Security and Privacy -- 3.3.2.4 MCC Context Awareness -- 3.3.3 From Internet Clouds to User-Centric Mobile Clouds -- 3.3.3.1 Current Mobile Cloud Computing and the Direction of Travel -- 3.3.3.2 The User-Centric Approach to Mobile Cloud Computing -- 3.3.4 Design Principles of User-Centric Mobile Cloud Computing -- 3.3.5 Mobile as a Representative: A User-Centric Methodology -- 3.3.6 User-Centric MaaR Model-Based Application Scenario -- 3.3.7 Summary -- 3.4 Case Studies -- 3.4.1 Instagram: The Billion-Dollar App. 327 $a3.4.2 Netflix: An Established Company That Shifted Its Entire Enterprise to the Cloud -- 3.4.3 NOAA, Email, and Collaboration in the Cloud: A Government Case -- 3.4.4 The Obama Campaign: A Not-for-Profit Case -- 3.4.5 Summary -- 3.5 Conclusion -- References -- Chapter 4: Biometrics as a Service -- 4.1 Introduction -- 4.2 Cloud and Mobility -- 4.3 Complex Threats and the Cybersecurity Landscape -- 4.3.1 Cloud-Enabled BYOD -- 4.3.2 Virtualization for BYOD -- 4.3.3 Emerging Mobile Business Workforce -- 4.3.4 The Financial and Banking Sector -- 4.3.4.1 Challenges -- 4.3.5 E-Commerce -- 4.3.5.1 Challenges -- 4.3.5.2 Variety of Devices and Operating Software -- 4.3.5.3 Identity and Access Management Difficulties in the Workplace -- 4.4 Emergence of Biometrics -- 4.4.1 Ubiquitous Biometric Technology -- 4.5 Taking Biometrics to the Cloud -- 4.5.1 Biometrics Meet Banking -- 4.5.2 Secure Payments -- 4.6 Biometrics as a Service Approaches -- 4.6.1 Market Challenges with Biometrics -- 4.7 Future Capabilities -- References -- Chapter 5: The Role of Intelligent Grid Technology in Cloud Computing -- 5.1 Introduction -- 5.2 Fundamentals of Grid and Cloud Computing -- 5.2.1 Grid Computing -- 5.2.1.1 Classification of Grid Operations -- 5.2.1.2 Benefits of Grid Computing -- 5.2.1.3 Disadvantages of Grid Computing -- 5.3 Cloud Computing -- 5.3.1 Types of Cloud -- 5.4 Models of Grid and Cloud Computing -- 5.4.1 Distributed Computing -- 5.5 Cloud Computing and Grid Computing Compared -- 5.6 Model -- 5.6.1 Software -- 5.6.2 Infrastructure -- 5.6.3 Platform -- 5.6.4 Applications -- 5.7 Virtualization and Cloud Computing -- 5.8 Techniques -- 5.8.1 Service Orientation and Web Services -- 5.8.2 Data Execution -- 5.8.3 Monitoring -- 5.8.4 Amazon Cloud Watch -- 5.8.5 Azure Diagnostic Monitor -- 5.8.6 Hyperic Cloud Status -- 5.8.7 Autonomic Computing. 327 $a5.8.8 Structure and Effects of Clouds and Grids -- 5.8.9 Interoperability -- 5.9 The Future of Grid Computing -- 5.10 Conclusion -- References -- Chapter 6: Application of Networks in Cloud Computing -- 6.1 Introduction to Cloud Networking -- 6.2 Networks -- 6.2.1 Types of Network -- 6.2.2 Network Operating Systems -- 6.2.3 Network Architecture -- 6.2.3.1 Cloud Architectural Layers -- 6.2.3.2 Network Architecture for Clouds -- 6.2.3.2.1 Data Centre Network -- 6.2.3.2.2 Data Centre Interconnect Network -- 6.2.3.2.3 Network Protocols -- 6.2.4 Network Security -- 6.3 Importance of Networking in Cloud Computing -- 6.4 Challenges in Existing Cloud Networks -- 6.5 Future Scope in Cloud Networking -- 6.6 Conclusion -- References -- Chapter 7: Privacy and Security Issues in Cloud Computing -- 7.1 Introduction -- 7.1.1 Definition -- 7.1.2 Service Models -- 7.1.2.1 Infrastructure as a Service (IaaS) -- 7.1.2.2 Platform as a Service (PaaS) -- 7.1.2.3 Software as a Service (SaaS) -- 7.1.3 Deployment Models -- 7.2 Research Challenges in Cloud Computing -- 7.3 Cloud Computing Solutions -- 7.3.1 Security Issues -- 7.3.1.1 Trusted Third Party -- 7.3.1.1.1 Low- and High-Level Confidentiality -- 7.3.1.1.2 Authentication of Server and Client -- 7.3.1.1.3 Formation of Security Domains -- 7.3.1.1.4 Data Cryptographic -- 7.3.1.1.5 Authorization Based on Certificate -- 7.3.1.1.5.1 Access Control Method -- 7.3.1.1.5.2 Policy Integration Method -- 7.3.2 Privacy Issues -- 7.3.2.1 Identity Management -- 7.3.2.2 User Control Methods -- 7.4 Conclusion -- References -- Chapter 8: Design and Development of E-Commerce-Oriented PaaS Application in Cloud Computing Environment -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Proposed Framework -- 8.3.1 Steps involved in Verification and Validation of Application -- 8.3.2 Web Application -- 8.3.3 Credit Card Validation Process. 327 $a8.3.4 LUHN MOD 10 Algorithm -- 8.3.4.1 Steps of Luhn Algorithm -- 8.3.4.2 Example of Luhn Algorithm -- 8.3.4.3 Algorithm Used -- 8.4 Simulation Performed -- 8.4.1 Simulation Environment -- 8.4.2 Google App Engine -- 8.5 Implementation/Execution -- 8.6 Conclusion and Future Work -- References -- Chapter 9: UAV Environment in FANET: An Overview -- 9.1 Introduction -- 9.2 Related Work -- 9.3 FANET Overview -- 9.3.1 Categories of UAVs -- 9.3.2 UAV Communication -- 9.4 Routing Techniques -- 9.4.1 Clustering -- 9.4.2 Discovery -- 9.4.3 Link State -- 9.4.4 Mobility Information -- 9.4.5 Prediction -- 9.4.6 Energy Efficiency -- 9.4.7 Secured Link -- 9.4.8 Broadcasting -- 9.4.9 Store and Carry Forward -- 9.4.10 Greedy Forwarding -- 9.4.11 Static Technique -- 9.4.12 Hierarchical Technique -- 9.5 Cloud Computing in FANET -- 9.6 Mobility Models -- 9.7 Routing Protocols -- 9.7.1 Energy-Based Routing Protocols -- 9.7.2 Security-Based Routing Protocols -- 9.8 Challenges and Solutions -- 9.9 Conclusion -- References -- Chapter 10: A Transition from Cloud to Fog Computing: Identifying Features, Challenges and the Future -- 10.1 Introduction -- 10.2 From Cloud Computing to Fog Computing -- 10.3 Fog Computing -- 10.4 Differences between Cloud Computing and Fog Computing -- 10.5 Fog Computing Model -- 10.5.1 Layered Architecture of Fog Computing -- 10.6 Applications of Fog Computing -- 10.7 Advantages of Fog Computing -- 10.8 Application of Fog Computing in Smart Cities -- 10.8.1 Traffic Regulation -- 10.8.2 Waste Management -- 10.8.3 Environmental Control -- 10.8.4 Surveillance Systems -- 10.9 Limitations of Adopting Fog Computing -- References -- Index. 330 $a"This book lays a good foundation for the core concepts and principles of cloud computing applications, walking the reader through the fundamental ideas with expert ease. The book progresses on the topics in a step-by-step manner. It reinforces theory with a full-fledged pedagogy designed to enhance students' understanding and offer them a practical insight into the applications of it. It is a valuable source of knowledge for researchers, engineers, practitioners, and graduate and doctoral students working in the field of cloud computing. It will also be useful for faculty members of graduate schools and universities"--$cProvided by publisher. 330 $aIn the era of the Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such a humongous amount of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Cloud computing provides a cheap source of such a computing framework for a large volume of data for real-time applications. It is, therefore, not surprising to see that cloud computing has become a buzzword in the computing fraternity over the last decade. Applications of Cloud Computing:Approaches and Practices lays a good foundation for the core concepts and principles of cloud computing applications, walking the reader through the fundamental ideas with expert ease. The book progresses on the topics in a step-by-step manner. It reinforces theory with a full-fledged pedagogy designed to enhance students' understanding and offer them a practical insight into the applications of it. It is a valuable source of knowledge for researchers, engineers, practitioners, and graduate and doctoral students working in the field of cloud computing. It will also be useful for faculty members of graduate schools and universities. 606 $aCloud computing$2UAMSUB 608 $aLibros electrónicos 610 $aInformática 615 07$aCloud computing 676 $a004.6782 676 $a004.6782 686 $aC6190V$2EPS 702 $aSharma$b Prerna 702 $aSharma$b Moolchand 702 $aElhoseny$b Mohamed 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910971250503321 996 $aApplications of cloud computing$94484126 997 $aUNINA