Cloud Computing Design Patterns
- Prentice Hall/PearsonPTR
- Hardcover, ~ 528 pages
- ISBN: 9780133858563
- Available: June 8, 2015
- Thomas Erl
- Robert Cope
- Amin Naserpour
Table of Contents
- Chapter 1: Introduction
- Chapter 2: Understanding Design Patterns
- Chapter 3: Sharing, Scaling and Elasticity Patterns
- Chapter 4: Reliability, Resiliency and Recovery Patterns
- Chapter 5: Data Management and Storage Device Patterns
- Chapter 6: Virtual Server and Hypervisor Connectivity and Management Patterns
- Chapter 7: Monitoring, Provisioning and Administration Patterns
- Chapter 8: Cloud Service and Storage Security Patterns
- Chapter 9: Network Security, Identity & Access Management, and Trust Assurance Patterns
- Chapter 10: Common Compound Patterns
- Appendix A: Cloud Computing Mechanisms Glossary
- Appendix B: Cloud Computing Design Patterns Reference
"Thomas Erl's text provides a unique and comprehensive perspective on cloud design patterns that is clearly and concisely explained for the technical and layman alike. It is an informative, knowledgeable, and powerful insight that may guide cloud experts in achieving extraordinary results based on extraordinary expertise identified in this text. I will use this text as a resource in future cloud designs and architectural considerations."
- Dr. Nancy M. Landrevill, CEO/CISO, NML Computer Consulting
"This book continues the very high standard we have come to expect from ServiceTech Press. The book provides well explained vendor agnostic patterns to the challenges of providing or using cloud solutions from PaaS to SaaS. The book is not only a great patterns reference, but also a worth reading from cover to cover as the patterns are thought provoking, drawing out points that you should consider and ask of a potential vendor if you're adopting a cloud solution."
- Phil Wilkins, Enterprise Integration Architect, Monster
"This book provides an excellent read for anyone wanting to grasp the fundamentals and advanced concepts of cloud computing. The easy to understand format provides the reader with a clear direction on how to enable a more robust, dynamic, and efficient cloud environment while also providing vital information on how to effectively secure core components of the cloud. The reader who might not have a full understanding of cybersecurity implications as it relates to cloud will have the foundational knowledge to build out secure cloud environments. I would recommend this book to anyone serious about cloud security."
- Sean Cope, CISSP CEH CNDA, FedRAMP Assessment Lead, Homeland Security Consultants
"A very well written book, providing details of how to achieve the characteristics of a cloud, and hence enable businesses to achieve its benefits."
- Kumail Morawala, CCP Certified Trainer
"Cloud Computing Design Patterns is an excellent book to use when building or maintaining your cloud. The book is vendor neutral which ensures that there are no conflicts of interest as far as the authors and publisher go. I think that the diagrams and illustrations are particularly helpful since some people seem challenged with trying to visualize virtual machines."
- Laura Taylor, Relevant Technologies
"Cloud Computing Design Patterns takes a disciplined approach which to categorising cloud design building blocks and simplifying inherent technology complexities. It explains, in a lucid manner, why a particular design pattern is needed and how to approach a pertinent solution. I found the security patterns sections more versatile in covering examples, such as hypervisor attack vectors, threat mitigation strategies, and mobile device management security. Written in a catalogue style, this book takes you through a journey of development which is intuitive as well comprehensive enough."
- Anant Mahajan MR, Australian Department of Defense
"Readers will find it easy to read, comprehend and apply the cloud pattern principles in practice that have already been adopted by the industry."
- Matt Lorrain, Greg Ponto & Michael E. Young (Security Standards & Architecture team), Esri
"I thoroughly reviewed the mechanisms with stakeholders from our Identity and Access Management working group, and I have no critical comments or suggestions for new mechanisms. They are consistent with the security mechanisms that we have documented for enterprise security architectural guidance that we have completed in the Department of Veterans Affairs."
- Michael Dance Jr, Booze Allen Hamilton
"The models seem to be consistent and thorough, which should make them approachable and of value in scoping the design of reliable implementations. Overall, this is a good basis for progressing a common understanding of the vision of cloud practice – well done."
- Tom Cleary, Australian Computer Society (ACS)
This book is currently in development and is scheduled for release in June 8, 2015. To be notified of details regarding the release of this book and updates to this and related sites, provide your e-mail address: