Cloud computing design patterns:
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
New York ; Munich [u.a.]
Prentice Hall
2015
|
Schriftenreihe: | The Prentice Hall Service technology series
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028021547&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XXV, 552 S. Ill., graph. Darst. |
ISBN: | 9780133858563 0133858561 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042588276 | ||
003 | DE-604 | ||
005 | 20170607 | ||
007 | t| | ||
008 | 150529s2015 xx ad|| |||| 00||| eng d | ||
020 | |a 9780133858563 |c hbk |9 978-0-13-385856-3 | ||
020 | |a 0133858561 |9 0-13-385856-1 | ||
035 | |a (OCoLC)913475449 | ||
035 | |a (DE-599)BVBBV042588276 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-473 |a DE-11 |a DE-83 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a ST 530 |0 (DE-625)143679: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
084 | |a DAT 315f |2 stub | ||
100 | 1 | |a Erl, Thomas |d 1967- |e Verfasser |0 (DE-588)134145232 |4 aut | |
245 | 1 | 0 | |a Cloud computing design patterns |c Thomas Erl, Robert Cope, Amin Naserpour |
264 | 1 | |a New York ; Munich [u.a.] |b Prentice Hall |c 2015 | |
300 | |a XXV, 552 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Prentice Hall Service technology series | |
650 | 0 | 7 | |a Entwurfsmuster |0 (DE-588)4546895-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Entwurfsmuster |0 (DE-588)4546895-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Cope, Robert |e Verfasser |4 aut | |
700 | 1 | |a Naserpour, Amin |e Verfasser |0 (DE-588)1073834476 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028021547&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028021547 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 315f 2015 A 3346 |
---|---|
DE-BY-TUM_katkey | 2112893 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040008062917 |
_version_ | 1821934100294926336 |
adam_text | Contents at a Glance
Chapter 1: Introduction...........................................1
Chapter 2: Understanding Design Patterns..........................9
Chapter 3: Sharing, Scaling and Elasticity Patterns..............15
Chapter 4: Reliability, Resiliency and Recovery Patterns ........97
Chapter 5: Data Management and Storage Device Patterns...........167
Chapter 6: Virtual Server and Hypervisor Connectivity and
Management Patterns.............................................221
Chapter 7: Monitoring, Provisioning and Administration Patterns.283
Chapter 8: Cloud Service and Storage Security Patterns..........335
Chapter 9: Network Security, Identity Access Management and
Trust Assurance Patterns........................................395
Chapter 10: Common Compound Patterns............................471
Appendix A: Cloud Computing Mechanisms Glossary.................511
Appendix B: Alphabetical Design Patterns Reference..............535
About the Authors...............................................541
Index...........................................................543
Contents
Chapter 1: Introduction.................................................j
Objective of This Book......................................2
What This Book Does Not Cover...............................2
Who This Book Is For........................................2
Origin of This Book.........................................3
Recommended Reading.........................................3
How This Book Is Organized..................................3
Chapter 3: Sharing, Scaling and Elasticity Patterns......4
Chapter 4. Reliability, Resiliency and Recovery Patterns.4
Chapter 5: Data Management and Storage Device Patterns...4
Chapter 6: Virtual Server and Hypervisor Connectivity and
Management Patterns......................................4
Chapter 7: Monitoring, Provisioning and Administration Patterns .4
Chapter 8: Cloud Service and Storage Security Patterns...4
Chapter 9: Network Security, Identity Access Management
and Trust Assurance Patterns.............................4
Chapter 10: Common Compound Patterns.....................5
Appendix A: Cloud Computing Mechanisms Glossary..........5
Appendix B: Alphabetical Design Patterns Reference.......5
Additional Information......................................5
Symbol Legend............................................5
Pattern Documentation Conventions........................5
Updates. Errata, and Resources (www.servicetechbooks com).. .6
Cloud Computing Design Patterns (www.cloudpatterns org)..6
What Is Cloud? (www whatiscloud com).....................6
Referenced Specifications (www servicetechspecs com) 6
The Service Technology Magazine (www servicetechmag com) 6
CloudSchool.com™ Certified Cloud (CCP) Professional
(www.cloudschool.com) 6
Social Media and Notification 7
··
Contents
Understanding Design Patterns
About Pattern Profiles..................
Requirement .........................
Icon.................................
Problem..............................
Solution.............................
Application .........................
Mechanisms ..........................
About Compound Patterns.................
Design Pattern Notation.................
Capitalization......................
Page Number References..............
Measures of Design Pattern Application ..
Working with This Catalog..............
.9
11
.11
.11
.11
.12
.12
.12
. 12
.13
.13
.13
.13
. 14
3: Sharing. Scaling and Elasticity Patterns.........15
Shared Resources...
Problem.............
Solution...........
Application........
Mechanisms.........
Workload Distribution
Problem............
Solution...........
Application........
Mechanisms.........
Dynamic Scalability .
Problem.........
Solution...........
Application........
Mechanisms........
17
.17
.18
.19
.21
22
22
22
22
.24
.25
.25
.27
.28
.31
Contents Xl
Service Load Balancing....................................32
Problem................................................32
Solution...............................................33
Application............................................34
Mechanisms.............................................36
Elastic Resource Capacity.................................37
Problem................................................37
Solution...............................................37
Application............................................38
Mechanisms.............................................40
Elastic Network Capacity..................................42
Problem................................................42
Solution...............................................43
Application............................................43
Mechanisms.............................................43
Elastic Disk Provisioning.................................45
Problem................................................45
Solution...............................................46
Application............................................48
Mechanisms.............................................49
Load Balanced Virtual Server Instances....................51
Problem................................................51
Solution...............................................52
Application............................................53
Mechanisms.............................................55
Load Balanced Virtual Switches............................57
Problem................................................57
Solution...............................................58
Application............................................58
Mechanisms.............................................60
Service State Management .................................61
Problem................................................61
Solution...............................................61
Application............................................62
Mechanisms.............................................63
Contents
Storage Workload Management................
Problem................................
Solution...............................
Application............................
Mechanisms.............................
Dynamic Data Normalization.................
Problem................................
Solution...............................
Application............................
Mechanisms.............................
Cross-Storage Device Vertical Tiering ...
Problem................................
Solution...............................
Application............................
Mechanisms.............................
Intra-Storage Device Vertical Data Tiering
Problem................................
Solution...............................
Application............................
Mechanisms.............................
Memory Over-Committing....................
Problem...............................
Solution..............................
Application...........................
Mechanisms............................
NIC Teaming ................................
Problem...............................
Solution..............................
Application...........................
Mechanisms............................
Broad Access..............................
Problem...............................
Solution...........................
Application........................
Mechanisms...........
.64
. 64
. 64
. 66
. 69
.71
. .71
. .72
. .72
. .73
. .74
. .74
. .76
. .76
. .79
..81
. . .81
. . .81
. . .82
. . 85
. .86
. . 86
. . .87
. . 88
. . 89
..90
. . 90
. . 90
. . .91
. . 92
..93
. . .93
. . .93
. . 94
. . 94
Contents
xiii
Chapter 4: Reliability. Resiliency and Recovery
Patterns...............................................................
Resource Pooling..........................................99
Problem................................................99
Solution...............................................99
Application...........................................100
Mechanisms............................................103
Resource Reservation.....................................106
Problem...............................................106
Solution..............................................107
Application...........................................107
Mechanisms............................................110
Hypervisor Clustering....................................112
Problem...............................................112
Solution..............................................112
Application...........................................114
Mechanisms............................................117
Redundant Storage........................................119
Problem...............................................119
Solution..............................................121
Application...........................................121
Mechanisms............................................122
Dynamic Failure Detection and Recovery...................123
Problem...............................................123
Solution..............................................123
Application...........................................123
Mechanisms............................................126
Multipath Resource Access................................127
Problem...............................................127
Solution..............................................128
Application...........................................129
Mechanisms............................................131
Contents
Redundant Physical Connection for Virtual Servers...........132
.. .132
Problem.............................................
133
Solution................................................
134
Application.............................................
Mechanisms..............................................
Synchronized Operating State................................138
Problem.................................................^38
Solution................................................138
Application.............................................^33
Mechanisms..............................................142
Zero Downtime...............................................143
Problem............................................... 143
Solution................................................143
Application.............................................144
Mechanisms..............................................144
Storage Maintenance Window..................................147
Problem.................................................147
Solution................................................148
Application.............................................148
Mechanisms..............................................154
Virtual Server Auto Crash Recovery..........................155
Problem.................................................155
Solution................................................156
Application.............................................157
Mechanisms..............................................158
Non-Disruptive Service Relocation...........................159
.................................................
Solution................................................160
Application...............................................
Mechanisms............................................ -104
Contents
XV
Chapter 5: Data Management and Storage
Device Patterns................................................... 167
Direct I/O Access.......................................169
Problem..............................................169
Solution.............................................169
Application..........................................169
Mechanisms...........................................171
Direct LUN Access.......................................173
Problem..............................................173
Solution.............................................174
Application..........................................174
Mechanisms...........................................176
Single Root I/O Virtualization .........................178
Problem..............................................178
Solution.............................................179
Application..........................................179
Mechanisms...........................................180
Cloud Storage Data at Rest Encryption...................181
Problem..............................................181
Solution.............................................182
Application..........................................182
Mechanisms...........................................183
Cloud Storage Data Lifecycle Management.................184
Problem..............................................184
Solution.............................................185
Application......................................... 185
Mechanisms...........................................186
Cloud Storage Data Management...........................187
Problem............................................. 187
Solution............................................ 188
Application......................................... 188
Mechanisms.......................................... 189
Contents
Cloud Storage Data Placement Compliance Check
Problem.........................................
Solution........................................
Application.....................................
Mechanisms......................................
Cloud Storage Device Masking........................
Problem.........................................
Solution........................................
Application.....................................
Mechanisms......................................
Cloud Storage Oevice Path Masking...................
Problem.........................................
Solution........................................
Application.....................................
Mechanisms......................................
Cloud Storage Device Performance Enforcement.
Problem.........................................
Solution........................................
Application.....................................
Mechanisms......................................
Virtual Disk Splitting..............................
Problem.........................................
Solution........................................
Application.....................................
Mechanisms........................................
190
.190
.191
.191
.192
194
.194
.194
.195
.197
198
.198
.198
.199
200
.201
.201
202
202
203
.204
204
205
206
209
Sub-LUN Tiering...............
Problem...................
Solution..................
Application...............
Mechanisms................
RAID Baaed Data Placement
Problem...................
Solution..................
Application...............
Mfvcnoniomft...........
210
.210
.210
.211
.213
214
.214
.214
.215
.217
Contents xvll
IP Storage Isolation.....................................218
Problem...............................................218
Solution..............................................218
Application...........................................218
Mechanisms............................................220
Chapter 6: Virtual Server and Hypervisor
Connectivity and Management Patterns..................................221
Virtual Server Folder Migration..........................223
Problem...............................................223
Solution..............................................225
Application...........................................225
Mechanisms............................................226
Persistent Virtual Network Configuration ................227
Problem...............................................227
Solution..............................................227
Application...........................................228
Mechanisms............................................229
Virtual Server Connectivity Isolation....................231
Problem...............................................231
Solution..............................................232
Application...........................................233
Mechanisms............................................234
Virtual Switch Isolation ................................235
Problem...............................................235
Solution..............................................236
Application...........................................236
Mechanisms............................................238
Virtual Server NAT Connectivity..........................240
Problem...............................................240
Solution..............................................240
Application...........................................240
Mechanisms............................................243
xvtii
Contents
External Virtual Server Accessibility
Problem...........................
Solution..........................
Application.......................
Mechanisms........................
Cross-Hypervisor Workload Mobility
Problem...........................
Solution..........................
Application.......................
Mechanisms........................
Virtual Server-to-Host Affinity......
Problem...........................
Solution..........................
Application.......................
Mechanisms........................
Virtual $erver-to-Host Anti-Affinity
Problem...........................
Solution..........................
Application.......................
Mechanisms......................
244
.244
.245
.245
.246
,247
.247
.248
.250
.250
.252
.252
253
, 254
. .257
.258
. .258
..261
. .261
. 264
Virtual Server-to-Host Connectivity..........................265
Problem.................................................
Solution................................................266
Application...............................................266
Mechanisms................................................266
Virtual Server-to-Virtual Server Affinity....................267
Problem..................................................267
Solution.................................................269
Application..............................................269
Mechanisms...............................................271
Virtual Server-to-Virtual Server Anti-Affinity...............272
Problem..................................................272
Solution.................................................275
Application..............................................275
Mechanisms....................
Contents ХІХ
Stateless Hypervisor ....................................278
Problem..............................................278
Solution.............................................278
Application..........................................279
Mechanisms...........................................282
Chapter 7: Monitoring. Provisioning and
Administration Patterns..............................................283
Usage Monitoring.........................................285
Problem..............................................285
Solution.............................................285
Application..........................................286
Mechanisms...........................................287
Pay-as-You-Go............................................288
Problem..............................................288
Solution.............................................288
Application..........................................289
Mechanisms...........................................291
Realtime Resource Availability...........................292
Problem..............................................292
Solution.............................................292
Application......................................... 293
Mechanisms...........................................294
Rapid Provisioning.......................................295
Problem..............................................295
Solution.............................................296
Application......................................... 296
Mechanisms.......................................... 299
Platform Provisioning....................................301
Problem 301
Solution............................................ 301
Application......................................... 302
Mechanisms 304
Contents
Bare-Metal Provisioning....................................
_ w ...........305
Problem..................................
305
Solution...............................................
305
Application.........................................
Mechanisms..........................................*՛ ‘
Automated Administration...................................310
Problem.................................................310
Solution................................................3^3
Application.............................................31^
Mechanisms..............................................31^
Centralized Remote Administration...........................315
Problem.................................................315
Solution................................................317
Application.............................................317
Mechanisms..............................................318
Resource Management.........................................320
Problem.................................................320
Solution................................................320
Application.............................................321
Mechanisms..............................................323
Self-Provisioning ..........................................324
Problem.................................................324
Solution................................................325
Application.............................................325
Mechanisms..............................................329
Power Consumption Reduction.................................330
Problem.................................................330
Solution.................................................
Application..............................................
Mechanisms............................................. 334
Contents xxl
Chapter 8: Cloud Service and Storage
Security Patterns....................................................335
Trusted Platform BIOS....................................337
Problem..............................................337
Solution.............................................338
Application..........................................339
Mechanisms ..........................................340
Geotagging...............................................341
Problem..............................................341
Solution.............................................341
Application..........................................342
Mechanisms ..........................................343
Hypervisor Protection....................................344
Problem..............................................344
Solution.............................................346
Application..........................................347
Mechanisms...........................................349
Cloud VM Platform Encryption.............................350
Problem..............................................350
Solution.............................................350
Application..........................................352
Mechanisms...........................................353
Trusted Cloud Resource Pools.............................354
Problem..............................................354
Solution.............................................354
Application......................................... 356
Mechanisms 358
Secure Cloud Interfaces and APIs.........................360
Problem..............................................360
Solution.............................................361
Application..........................................361
Mechanisms...........................................363
Contents
Cloud Resource Access Control.................
Problem....................................
Solution...................................
Application................................
Mechanisms.................................
Detecting and Mitigating User-Installed VMs
Problem....................................
Solution...................................
Application................................
Mechanisms.................................
Mobile BYOD Security..........................
Problem....................................
Solution...................................
Application................................
Mechanisms ................................
364
364
366
368
368
369
369
.371
.372
.374
.376
.376
.378
380
.381
Cloud Data Breach Protection..................................382
Problem...................................................382
Solution..................................................384
Application...............................................384
Mechanisms................................................386
Permanent Data Loss Protection.............................387
Problem...................................................387
Solution..................................................388
Application...............................................389
Mechanisms ...............................................3g0
In-Transit Cloud Data Encryption.............................391
Prob։em...................................................391
So*ulion..................................................391
Application.............................................. 392
Mechanisms.............................................. on i
Contents
xxiii
Chapter 9: Network Security. Identity
Access Management and Trust Assurance Patterns ... .395
Secure On-Premise Internet Access........................397
Problem...............................................397
Solution..............................................398
Application...........................................400
Mechanisms............................................403
Secure External Cloud Connection.....................404
Problem...............................................404
Solution..............................................404
Application...........................................405
Mechanisms ...........................................408
Secure Connection for Scaled VMs...................409
Problem...............................................409
Solution..............................................412
Application...........................................414
Mechanisms............................................415
Cloud Denial-of-Service Protection.......................416
Problem...............................................416
Solution..............................................410
Application...........................................419
Mechanisms............................................420
Cloud Traffic Hijacking Protection.....................421
Problem...............................................421
Solution..............................................423
Application.......................................... 423
Mechanisms..................... 424
Automatically Defined Perimeter.....................425
Problem.............................................. 425
Solution.................. 426
Application.................... 427
Mechanisms............................................429
xxiv
Contents
Cloud Authentication Gateway..
Problem......................
Solution.....................
Application..................
Mechanisms...................
Federated Cloud Authentication
Problem......................
Solution.....................
Application..................
Mechanisms ..................
Cloud Key Management.............
Problem......................
Solution.....................
Application..................
Mechanisms...................
430
430
.431
432
435
436
436
438
439
443
444
444
445
446
.447
Trust Attestation Service......................................448
Problem....................................................448
Solution...................................................449
Application................................................449
Mechanisms ................................................451
Collaborative Monitoring and Logging........................452
Problem.................................................452
Solution................................................455
Application.............................................455
Mechanisms..............................................459
Independent Cloud Auditing..................................460
Problem.................................................460
Solution................................................461
Application.............................................463
Mechanisms..............................................464
Threat Intelligence Processing..............................465
Problem.................................................465
Solution................................................466
AppfcaBon...............................................468
Mechanisms.............................................. «o
Contents
XXV
Chapter 10: Common Compound Patterns.........................471
“Compound Pattern” vs. “Composite Pattern .........472
Compound Pattern Members...........................472
Joint Application vs. Coexistent Application.......472
Private Cloud......................................474
Public Cloud.......................................476
Software-as-a-Service (SaaS).......................478
Platform-as-a-Service (PaaS).......................480
Inf rastructure-as-a-Service (laaS)................482
Elastic Environment................................484
Multitenant Environment............................486
Resilient Environment..............................490
Cloud Bursting.....................................492
Burst Out to Private Cloud.........................493
Burst Out to Public Cloud..........................496
Burst In...........................................499
Secure Burst Out to Private Cloud/Public Cloud.....501
Cloud Balancing....................................503
Cloud Authentication...............................505
Resource Workload Management.......................506
Isolated Trust Boundary............................508
Appendix A: Cloud Computing Mechanisms Glossary ... 511
Appendix B: Alphabetical Design Patterns
Reference....................................................*35
About the Authors............................................*41
Index........................................................*43
|
any_adam_object | 1 |
author | Erl, Thomas 1967- Cope, Robert Naserpour, Amin |
author_GND | (DE-588)134145232 (DE-588)1073834476 |
author_facet | Erl, Thomas 1967- Cope, Robert Naserpour, Amin |
author_role | aut aut aut |
author_sort | Erl, Thomas 1967- |
author_variant | t e te r c rc a n an |
building | Verbundindex |
bvnumber | BV042588276 |
classification_rvk | ST 200 ST 300 ST 530 |
classification_tum | DAT 250f DAT 315f |
ctrlnum | (OCoLC)913475449 (DE-599)BVBBV042588276 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01764nam a2200433 c 4500</leader><controlfield tag="001">BV042588276</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170607 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">150529s2015 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133858563</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-13-385856-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133858561</subfield><subfield code="9">0-13-385856-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913475449</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042588276</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 315f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erl, Thomas</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)134145232</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud computing design patterns</subfield><subfield code="c">Thomas Erl, Robert Cope, Amin Naserpour</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York ; Munich [u.a.]</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 552 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Prentice Hall Service technology series</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Entwurfsmuster</subfield><subfield code="0">(DE-588)4546895-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cope, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Naserpour, Amin</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1073834476</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028021547&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028021547</subfield></datafield></record></collection> |
id | DE-604.BV042588276 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:15:14Z |
institution | BVB |
isbn | 9780133858563 0133858561 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028021547 |
oclc_num | 913475449 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-11 DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-11 DE-83 |
physical | XXV, 552 S. Ill., graph. Darst. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Prentice Hall |
record_format | marc |
series2 | The Prentice Hall Service technology series |
spellingShingle | Erl, Thomas 1967- Cope, Robert Naserpour, Amin Cloud computing design patterns Entwurfsmuster (DE-588)4546895-3 gnd Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)4546895-3 (DE-588)7623494-0 |
title | Cloud computing design patterns |
title_auth | Cloud computing design patterns |
title_exact_search | Cloud computing design patterns |
title_full | Cloud computing design patterns Thomas Erl, Robert Cope, Amin Naserpour |
title_fullStr | Cloud computing design patterns Thomas Erl, Robert Cope, Amin Naserpour |
title_full_unstemmed | Cloud computing design patterns Thomas Erl, Robert Cope, Amin Naserpour |
title_short | Cloud computing design patterns |
title_sort | cloud computing design patterns |
topic | Entwurfsmuster (DE-588)4546895-3 gnd Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Entwurfsmuster Cloud Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028021547&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT erlthomas cloudcomputingdesignpatterns AT coperobert cloudcomputingdesignpatterns AT naserpouramin cloudcomputingdesignpatterns |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 315f 2015 A 3346 Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |