Cloud-native Computing: Software Engineering von Diensten und Applikationen für die Cloud
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
München
Hanser
[2024]
|
Ausgabe: | 2., überarbeitete Auflage |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034813849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Auf dem Cover: "E-Book inklusive" |
Umfang: | XI, 375 Seiten Illustrationen, Diagramme 25 cm Enthält: Online-Ressource |
ISBN: | 9783446479142 3446479147 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV049468220 | ||
003 | DE-604 | ||
005 | 20240325 | ||
007 | t| | ||
008 | 231215s2024 gw a||| |||| 00||| ger d | ||
015 | |a 23,N44 |2 dnb | ||
016 | 7 | |a 1307212611 |2 DE-101 | |
020 | |a 9783446479142 |c : circa EUR 59.99 (DE), circa EUR 61.70 (AT) |9 978-3-446-47914-2 | ||
020 | |a 3446479147 |9 3-446-47914-7 | ||
024 | 3 | |a 9783446479142 | |
028 | 5 | 2 | |a Bestellnummer: 553/47914 |
035 | |a (OCoLC)1416408655 | ||
035 | |a (DE-599)DNB1307212611 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a ger | |
044 | |a gw |c XA-DE-BY | ||
049 | |a DE-210 |a DE-91G |a DE-2070s |a DE-12 |a DE-523 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |8 1\p |a 004 |2 23sdnb | ||
100 | 1 | |a Kratzke, Nane |d 1976- |e Verfasser |0 (DE-588)132451956 |4 aut | |
245 | 1 | 0 | |a Cloud-native Computing |b Software Engineering von Diensten und Applikationen für die Cloud |c Nane Kratzke |
250 | |a 2., überarbeitete Auflage | ||
264 | 1 | |a München |b Hanser |c [2024] | |
300 | |a XI, 375 Seiten |b Illustrationen, Diagramme |c 25 cm |e Enthält: Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Auf dem Cover: "E-Book inklusive" | ||
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
653 | |a Automatisierung | ||
653 | |a CI/CD | ||
653 | |a Container | ||
653 | |a Deployment-Modelle | ||
653 | |a DevOps | ||
653 | |a Docker | ||
653 | |a Kubernetes | ||
653 | |a Microservices | ||
653 | |a Private Cloud | ||
653 | |a Serverless | ||
653 | |a Sicherheit | ||
653 | |a Softwarearchitektur | ||
653 | |a FBITARCH: Softwarearchitektur | ||
653 | |a FBITITMG: IT-Management | ||
653 | |a INF2023 | ||
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 2 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 1 | 1 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-446-47925-8 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-3-446-48029-2 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034813849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a vlb |d 20231025 |q DE-101 |u https://d-nb.info/provenance/plan#vlb | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034813849 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 310 2024 A 78(2) |
---|---|
DE-BY-TUM_katkey | 2773829 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040009314094 |
_version_ | 1821934351658516480 |
adam_text | INHALT
VORWORT
...........................................................................................................
XIII
1
EINLEITUNG
...................................................................................................
1
1.1
AN
WEN
SICH
DIESES
BUCH
RICHTET
....................................................................................
2
1.2
WAS
DIESES
BUCH
BEHANDELT
............................................................................................
3
1.3
SPRACHLICHE
KONVENTIONEN
..............................................................................................
5
1.4
NOTATIONSKONVENTIONEN
....................................................................................................
6
1.5
ERGAENZENDE
MATERIALIEN
..................................................................................................
7
TEIL
I:
GRUNDLAGEN
.................................................................................
9
2
CLOUD
COMPUTING
.....................................................................................
11
2.1
SERVICE-MODELLE..............................................................................................................
12
2.1.1
INFRASTRUCTURE
AS
A
SERVICE
(LAAS)
.....................................................................
15
2.1.2
PLATFORM
AS
A
SERVICE
(PAAS)
...........................................................................
15
2.1.3
SOFTWARE
AS
A
SERVICE
(SAAS)
...........................................................................
16
2.2
CLOUD-OEKONOMIE
............................................................................................................
19
2.2.1
EIGNUNG
VON
UNTERSCHIEDLICHEN
ARTEN
VON
WORKLOADS
...................................
19
2.2.2
EFFEKT
VON
ZUTEILUNGSDAUER
UND
RESSOURCENGROESSE
........................................
22
2.3
ENTWICKLUNG
DER
LETZTEN
JAHRE
......................................................................................
24
3
DEVOPS
....................................................................................................
27
3.1
PRINZIPIEN
DES
FLOW
......................................................................................................
29
3.1.1
PRINZIP
1:
ARBEIT
SICHTBAR
MACHEN
.................................................................
29
3.1.2
PRINZIP
2:
WORK
IN
PROGRESS
BESCHRAENKEN
......................................................
30
3.1.3
PRINZIP
3:
FLASCHENHAELSE
MINIMIEREN
.............................................................
31
3.2
PRINZIPIEN
DES
FEEDBACKS
..............................................................................................
32
3.2.1
PRINZIP
4:
PROBLEME
FRUEH
ERKENNEN
...............................................................
32
3.2.2
PRINZIP
5:
PROBLEME
SOFORT
LOESEN
.....................................................................
32
3.2.3
PRINZIP
6:
PROBLEME
PROFESSIONELL
VERANTWORTEN
............................................
33
3.3
DEVOPS-GEEIGNETE
ARCHITEKTUREN
..................................................................................
33
3.3.1
RANDBEDINGUNGEN
FUER
DIE
ENTWICKLUNG
.........................................................
34
3.3.2
NUTZUNG
VON
ORCHESTRIERUNGSPLATTFORMEN
.......................................................
34
3.3.3
RANDBEDINGUNGEN
IM
BETRIEB
...........................................................................
35
4
CLOUD-NATIVE
..............................................................................................
37
4.1
DEFINITIONEN
IN
INDUSTRIE
UND
FORSCHUNG
......................................................................
39
4.2
DIE
CLOUD-NATIVE-DEFINITION
DIESES
BUCHS
.......................................
40
4.3
ZUSAMMENFASSUNG
UND
AUSBLICK
AUF
TEIL
II
BIS
IV
.......................................................
41
TEIL
II:
EVERYTHING
AS
CODE
..................................................................
45
5
EINLEITUNG
ZU
TEIL
II
....................................................................................
47
6
DEPLOYMENT-PIPELINES
..............................................................................
49
6.1
DEPLOYMENT-PIPELINES
AS
CODE
........................................................................................
50
6.1.1
PHASEN-PIPELINES
................................................................................................
51
6.1.2
GERICHTETE
PIPELINES
..........................................................................................
52
6.1.3
HIERARCHISCHE
PIPELINES
....................................................................................
53
6.1.4
STEUERUNG
VON
PIPELINES
..................................................................................
54
6.2
DEVOPS-GEEIGNETE
BRANCHING-STRATEGIEN
........................................................................
56
6.2.1
GIT-FLOW
.............................................................
57
6.2.2
GITHUB-FLOW
.........................................................
58
6.2.3
TRUNK-BASIERTE
ENTWICKLUNG
............................................................................
59
6.3
ZUSAMMENFASSUNG
.........................................................................................................
60
7
INFRASTRUCTURE
AS
CODE..............................................................................63
7.1
VIRTUALISIERUNG
..............................................................
65
7.1.1
VIRTUALISIERUNG
VON
HARDWARE-INFRASTRUKTUR
...................................................
65
7.1.2
VIRTUALISIERUNG
VON
SOFTWARE-INFRASTRUKTUR
.....................................................
66
7.2
PROVISIONIERUNG
...............................................................................................................
68
7.2.1
IMMUTABLE
INFRASTRUCTURE
................................................................................
68
7.2.2
LAC-ANSAETZE
........................................................................................................
69
7.2.3
PROVISIONIERUNG
VON
LOKALEN
UMGEBUNGEN
.....................................................
72
7.2.4
PROVISIONIERUNG
VON
MULTI-HOST-UMGEBUNGEN
...............................................
74
7.3
ZUSAMMENFASSUNG
.........................................................................................................
77
8
STANDARDISIERUNG
VON
DEPLOYMENT
UNITS
(CONTAINER)
.........................79
8.1
HINTERGRUND
(PAAS)
.........................................................................................................
79
8.2
BETRIEBSSYSTEM-VIRTUALISIERUNG
................................................
82
8.3
CONTAINER
RUNTIME
ENVIRONMENTS
..................................................................................
83
8.3.1
KERNEL-NAMESPACES
..........................................................................................
84
8.3.2
PROCESS
CAPABILITIES
..........................................................................................
85
8.3.3
CONTROL
GROUPS
..................................................................................................
86
8.3.4
UNION
FILESYSTEM
..............................................................................................
86
8.3.5
HIGH-LEVEL
UND
LOW-LEVEL-CONTAINER-LAUFZEITUMGEBUNGEN
..........................
87
8.4
BAU
UND
BEREITSTELLUNG
VON
CONTAINER-IMAGES
..............................................................
88
8.5
FAKTOREN
GUT
BETREIBBARER
CONTAINER
............................................................................
90
8.5.1
CODEBASE
...........................................................................................................
91
8.5.2
ABHAENGIGKEITEN
UND
KONFIGURATIONEN
............................................................
91
8.5.3
UNTERSTUETZENDE
SERVICES
UND
PORT
BINDING
.....................................................
92
8.5.4
BUILD-,
RELEASE-UND
RUN-PHASE
........................................................................
93
8.5.5
HORIZONTALE
SKALIERUNG
UEBER
PROZESSE
............................................................
94
8.5.6
UMGEBUNGEN,
LOGS
UND
BETRIEB
......................................................................
95
8.6
ZUSAMMENFASSUNG
.........................................................................................................
96
9
CONTAINER-PLATTFORMEN
.............................................................................
99
9.1
SCHEDULING
.....................................................................................................................
100
9.1.1
HETEROGENITAET
VON
WORKLOADS
........................................................................
101
9.1.2
SCHEDULING-ALGORITHMEN
................................................................................
102
9.1.2.1
EINFACHE
SCHEDULING-ALGORITHMEN
..................................................
102
9.1.2.2
MULTIDIMENSIONALE
SCHEDULING-ALGORITHMEN
................................
103
9.1.2.3
KAPAZITAETSBASIERTE
SCHEDULING-ALGORITHMEN
................................
103
9.1.3
SCHEDULING-ARCHITEKTUREN
..............................................................................
104
9.1.3.1
MONOLITHISCHER
SCHEDULER
.............................................................
105
9.1.3.2
2-LEVEL-SCHEDULER
...........................................................................
105
9.1.3.3
SHARED-STATE
SCHEDULER
...................................................................
106
9.2
ORCHESTRIERUNG
............................................................................................................
107
9.2.1
DEFINITION
VON
BETRIEBSZUSTAENDEN
..................................................................
107
9.2.2
REGELKREIS:
DESIRED
VERSUS
CURRENT
STATE
......................................................
108
9.3
INSIDE
KUBERNETES
........................................................................................................
109
9.3.1
KUBERNETES-ARCHITEKTUR
..................................................................................
110
9.3.2
VERWALTETE
RESSOURCEN
UND
BASIS-BLUEPRINT
.................................................
112
9.3.3
SCHEDULBARE
WORKLOADS
..................................................................................
114
9.3.3.1
DEPLOYMENTS
..................................................................................
114
9.3.3.2
(CRON-)JOBS......................................................................................
116
9.3.3.3
DAEMON-SETS
..................................................................................
117
9.3.3.4
STATEFUL-SETS
....................................................................................
118
9.3.4
SCHEDULING
CONSTRAINTS
..................................................................................
121
9.3.4.1
ANGABE
DES
RESSOURCENBEDARFS
MITTELS
REQUESTS
UND
LIMITS
...
121
9.3.4.2
KNOTEN-SELEKTOREN
..........................................................................
122
9.3.4.3
KNOTENAFFINITAETEN
..........................................................................
123
9.3.4.4
POD-(ANTI-)AFFINITAETEN
.....................................................................
124
9.3.5
AUTOMATISCHE
SKALIERUNG
VON
WORKLOADS
....................................................
125
9.3.6
EXPONIEREN
VON
WORKLOADS
ALS
INTERNE
UND
EXTERNE
SERVICES
......................
126
9.3.7
HEALTH
CHECKING
.............................................................................................
129
9.3.8
PERSISTENZ
.......................................................................................................
132
9.3.9
ISOLATION
VON
WORKLOADS
.................................................................................
133
9.3.9.1
NAMESPACES
UND
ROLE-BASED
ACCESS
MODEL
(MULTI-TENANCY)
....
133
9.3.9.2
QUOTAS
UND
LIMIT
RANGES
................................................................
134
9.3.9.3
NETWORK
POLICYS
...............................................................................
135
9.4
ZUSAMMENFASSUNG
.....................................................................................................
137
10
FUNCTION
AS
A
SERVICE
.......................
141
10.1
FAAS-PLATTFORMEN
.........................................................................................................
143
10.1.1
DAS
FAAS-PROGRAMMIERMODELL
.......................................................................
145
10.1.2
ZU
BERUECKSICHTIGENDE
RANDBEDINGUNGEN
.....................................................
146
10.1.3
VERANSCHAULICHUNG
DES
FAAS-PROGRAMMIERMODELLS
....................................
147
10.2
PLATTFORMAGNOSTISCHE
FAAS-FRAMEWORKS....................................................................
149
10.3
EREIGNISBASIERTE
AUTOSKALIERUNG
................................................................................
152
10.4
ZUSAMMENFASSUNG
.....................................................................................................
155
TEIL
III:
CLOUD-NATIVE
ARCHITEKTUREN
..............................................
157
11
EINLEITUNG
ZU
TEIL
III
..............................................................................
159
12
MICROSERVICE
UND
SERVERLESS-ARCHITEKTUREN
......................................
161
12.1
EIGENSCHAFTEN
VON
MICROSERVICES
..............................................................................
162
12.2
INTEGRATIONSMUSTER
FUER
MICROSERVICES
......................................................................
166
12.2.1
DATENBANKBASIERTE
INTEGRATION
.....................................................................
167
12.2.2
(G)RPC-BASIERTE
INTERPROZESSKOMMUNIKATION
..............................................
167
12.2.3
REPRESENTATIONAL
STATE
TRANSFER
(REST)
.......................................................
170
12.2.4
EREIGNISBASIERTE
INTEGRATION
(ASYNCHRON)
...................................................
173
12.2.5
API-VERSIONING
..............................................................................................
175
12.3
ARCHITEKTURELLE
SICHERHEIT
..........................................................................................
178
12.3.1
CIRCUIT-BREAKER
..............................................................................................
178
12.3.2
BULKHEAD
........................................................................................................
179
12.3.3
IDEMPOTENTE
API-OPERATIONEN
.......................................................................
180
12.4
SKALIERUNG
VON
MICROSERVICES
....................................................................................
180
12.4.1
LOAD
BALANCING
..............................................................................................
181
12.4.2
MESSAGING
......................................................................................................
181
12.4.3
SKALIERUNG
ZUSTANDSBEHAFTETER
KOMPONENTEN
..............................................
183
12.4.3.1
SCALING
FOR
READS
.............................................................................
184
12.4.3.2
SCALING
FOR
WRITES
(SHARDING)
..........................................................
184
12.4.3.3
COMMAND
QUERY
RESPONSIBILITY
SEGREGATION
(CORS)
...................
185
12.4.4
CACHING
..........................................................................................................
186
12.5
PRINZIPIEN
ZUR
ENTWICKLUNG
VON
MICROSERVICES
.........................................................
187
12.5.1
PRINZIP
1:
BILDE
MODELLE
UM
GESCHAEFTSKONZEPTE
..........................................
187
12.5.2
PRINZIP
2:
ERSCHAFFE
EINE
KULTUR
DER
AUTOMATISIERUNG
................................
187
12.5.3
PRINZIP
3:
BLENDE
INTERNE
IMPLEMENTIERUNGSDETAILS
AUS
.............................
188
12.5.4
PRINZIP
4:
DEZENTRALISIERE
..............................................................................
188
12.5.5
PRINZIP
5:
DEFINIERE
UNABHAENGIG
AKTUALISIERBARE
EINHEITEN
........................
188
12.5.6
PRINZIP
6:
ISOLIERE
FEHLER
................................................................................
189
12.5.7
PRINZIP
7:
BAUE
GUT
BEOBACHTBARE
SERVICES
...................................................
189
12.6
SERVERLESS-ARCHITEKTUREN
.............................................................................................
190
12.6.1
ARCHITEKTURELLE
KONSEQUENZEN
VON
SERVERLESS-LIMITIERUNGEN
....................
191
12.6.2
DAS
API-GATEWAY-PATTERN
................................................................................
193
12.6.3
ABGRENZUNG
ZU
MICROSERVICES
........................................................................
195
12.7
ZUSAMMENFASSUNG
......................................................................................................
196
13
BEOBACHTBARE
ARCHITEKTUREN
.................................................................
199
13.1
KONSOLIDIERUNG
VON
TELEMETRIEDATEN
.........................................................................
200
13.2
INSTRUMENTIERUNG
VON
SYSTEMEN
.................................................................................
202
13.2.1
LOGGING
..........................................................................................................
202
13.2.2
MONITORING
......................................................................................................204
13.2.2.1
METRIKARTEN
.....................................................................................
206
13.2.2.2
EMPFEHLUNGEN
FUER
DIE
METRIKINSTRUMENTIERUNG
............................
207
13.2.3
TRACING
............................................................................................................
207
13.2.3.1
EMPFEHLUNGEN
FUER
DIE
INSTRUMENTIERUNG
.....................................
209
13.2.3.2
TRACING-INSTRUMENTIERUNG
UND
ERZEUGUNG
VON
SPANS
.................
212
13.2.3.3
SERVERSEITIGES
TRACING
UND
EXTRAKTION
VON
SPAN-KONTEXTEN
....
213
13.2.3.4
CLIENTSEITIGES
TRACING
UND
WEITERREICHEN
VON
SPAN-KONTEXTEN.
.
214
13.3
AUTOMATISIERTE
INSTRUMENTIERUNG
...............................................................................
215
13.3.1
EIGENSCHAFTEN
VON
SERVICE-MESHS
..................................................................
216
13.3.2
TRAFFIC-MANAGEMENT
.......................................................................................
218
13.3.3
RESILIENZ
........................................................................................................
221
13.3.4
SICHERHEIT
.........................................................................................................
223
13.3.5
MANAGEMENT
UND
ANALYSE
VON
VERKEHRSTOPOLOGIEN
.....................................
226
13.4
ZUSAMMENFASSUNG
......................................................................................................
227
14
DOMAIN-DRIVEN
DESIGN
..........................................................................
229
14.1
FACHLICHKEIT
.................................................................................................................
230
14.2
STRATEGISCHES
DESIGN
....................................................................................................
232
14.2.1
SUBDOMAENEN
...................................................................................................
233
14.2.1.1
KERNDOMAENE
(CORE
SUBDOMAIN)
......................................................
233
14.2.1.2
UNTERSTUETZENDE
SUBDOMAENE
(SUPPORTING
SUBDOMAIN)
................234
14.2.1.3
GENERISCHE
SUBDOMAENEN
(GENERIC
SUBDOMAIN)
...........................234
14.2.1.4
ANMERKUNGEN
AM
BEISPIEL
EINER
FALLSTUDIE
..................................234
14.2.2
UBIQUITOUS
LANGUAGE
.....................................................................................236
14.2.2.1
EINE
GEMEINSAME
SPRACHE
ALS
SCHLUESSEL
ZU
EINEM
GEMEINSAMEN
VERSTAENDNIS
....................................................................................
237
14.2.2.2
MEHRDEUTIGE
UND
SYNONYME
BEGRIFFE
............................................
238
14.2.3
BOUNDED
CONTEXTS
...........................................................................................
239
14.2.4
CONTEXT
MAPPING
.............................................................................................
241
14.2.4.1
PARTNERSCHAFTLICHE
KOOPERATIONSMUSTER
(PARTNERS
UND
SHARED-KERNEL)
........................................................
241
14.2.4.2
CUSTOMER-SUPPLIER-KOOPERATION
......................................................
243
14.2.4.3
SEPARATE
WAYS
.................................................................................
244
14.2.4.4
CONTEXT
MAPS
ALS
LANDKARTE
VON
MACHTVERHAELTNISSEN
..................
245
14.3
TAKTISCHES
DESIGN
.........................................................................................................
246
14.3.1
OFT
GENUTZTE
PATTERN
FUER
GESCHAEFTSLOGIK
........................................................
246
14.3.1.1
DAS
ETL-PATTERN
(PRIMAER
SUPPORTING
SUBDOMAINS)
.......................
246
14.3.1.2
DAS
ACTIVE
RECORD-PATTERN
(PRIMAER
SUPPORTING
SUBDOMAINS)
...
247
14.3.1.3
DAS
DOMAIN
MODEL-PATTERN
(PRIMAER
CORE
SUBDOMAINS)
...............
248
14.3.1.4
DAS
EVENT-SOURCING-PATTERN
(PRIMAER
CORE
SUBDOMAINS)
...............250
14.3.2
OFT
GENUTZTE
PATTERN
FUER
DIE
ARCHITEKTUR
......................................................
251
14.3.2.1
DIE
EBENEN-ARCHITEKTUR
..................................................................
252
14.3.2.2
DAS
PORTS
&
ADAPTER-PATTERN
............................................................
253
14.3.2.3
DAS
CORS-PATTERN
...........................................................................
253
14.4
ZUSAMMENFASSUNG
.......................................................................................................
256
TEIL
IV:
SICHERE
CLOUD-NATIVE
ANWENDUNGEN
................................
259
15
EINLEITUNG
ZU
TEIL
IV
...............................................................................
261
16
HAERTUNG
DOUD-NATIVER
ANWENDUNGEN
.................................................
263
16.1
HAERTUNG
(VIRTUELLER)
INFRASTRUKTUREN
.........................................................................
267
16.1.1
TOOL-GESTUETZTES
SYSTEM
HARDENING
................................................................
268
16.1.2
KONTINUIERLICHE
AKTUALISIERUNG
VON
VIRTUELLEN
MASCHINEN
.........................
270
16.1.3
SICHERE
AUTHENTIFIZIERUNG
MITTELS
SSH
.......................................................
271
16.1.4
KONTINUIERLICHE
UEBERWACHUNG
VIRTUELLER
MASCHINEN
..................................
273
16.1.4.1
VERHALTENSBASIERTE
INTRUSION
DETECTION
MITTELS
AUDITING
.............
273
16.1.4.2
SIGNATURBASIERTE
INTRUSION
DETECTION
............................................
274
16.1.4.3
LOG
FORWARDING
...............................................................................276
16.1.5
EINSATZ
VON
SICHERHEITSGRUPPEN
UND
FIREWALLS
...........................................
277
16.2
HAERTUNG
CONTAINERISIERTER
WORKLOADS
.........................................................................
279
16.2.1
ABSICHERUNG
VON
PUBLIC
ENDPOINTS
MITTELS
INGRESSES
................................
280
16.2.2
NAMESPACE-BASIERTE
NETZWERKISOLATION
.......................................................
286
16.2.3
POD
HARDENING
..............................................................................................
289
16.2.4
ERHOEHUNG
DER
CONTAINER
RUNTIME
ISOLATION
.................................................
299
16.2.5
VOLUME
HARDENING
........................................................................................
300
16.2.6
WORKLOAD
POLICING
..........................................................................................
303
16.2.7
INTRUSION
DETECTION
........................................................................................
307
16.2.8
SICHERUNG
DER
SUPPLY
CHAIN
........................................................................
310
16.2.8.1
STATISCHE
SOFTWARE
COMPOSITION
ANALYSIS
(SCA)
...........................
311
16.2.8.2
STATIC
APPLICATION
SECURITY
TESTING
(SAST)
..................................314
16.2.8.3
KONTINUIERLICHES
SCHWACHSTELLEN-SCANNING
VON
CONTAINER
PLATTFORMEN
.....................................................................................
316
16.3
ZUSAMMENFASSUNG
......................................................................................................
319
17
REGULATORISCHE
ANFORDERUNGEN............................................................
321
17.1
CLOUD
COMPLIANCE
UND
ZERTIFIZIERUNGEN
...................................................................
322
17.1.1
ISO
9001
.......................................................................................................324
17.1.2
BSI-IT-GRUNDSCHUTZ
UND
BSI-STANDARDS
......................................................
325
17.1.3
BSI-C5-ZERTIFIZIERUNG
...................................................................................
325
17.1.4
ISO/IEC
27001
UND
27017/27018
..............................................................
326
17.1.5
CSASTAR
.....................................................................................................
327
17.1.6
CISPE
CODE
OF
CONDUCT
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
328
17.1.7
EU
CLOUD
CODE
OF
CONDUCT
...........................................................................
329
17.1.8
SOC
1-3
(SERVICE
ORGANIZATION
CONTROL)
......................................................
330
17.1.9
FEDRAMP
.......................................................................................................
331
17.1.10
HIPAA
............................................................................................................
331
17.1.11
PCI
DSS
........................................................................................................
332
17.1.12
ZUSAMMENFASSUNG
.......................................................................................
333
17.2
AUS
DER
DSGVO
SICH
ERGEBENDE
ANFORDERUNGEN
......................................................
335
17.2.1
PERSONENBEZOGENE
DATEN
.............................................................................
335
17.2.2
GRUNDSAETZE
DER
VERARBEITUNG
PERSONENBEZOGENER
DATEN
...........................336
17.2.3
AUFTRAGSVERARBEITUNG
...................................................................................
338
17.2.4
DATENSCHUTZ-FOLGENABSCHAETZUNGEN
..............................................................
340
17.2.5
INTERNATIONALE
DATENTRANSFERS
IN
DRITTLAENDER
..............................................
341
17.3
EUROPAEISCHER
DATENSCHUTZ
UND
DRITTLAENDER
...............................................................
343
17.3.1
PROBLEME
AM
BEISPIEL
DES
CLOUD
ACT
........................................................
344
17.3.2
LOESUNGEN
TROTZ
SCHREMS
I
+
II
..................................................................
345
17.4
ZUSAMMENFASSUNG
......................................................................................................
346
18
SCHLUSSBEMERKUNGEN
..........................................................................
349
LITERATURVERZEICHNIS
......................................................................................
359
STICHWORTVERZEICHNIS
....................................................................................
365
|
any_adam_object | 1 |
author | Kratzke, Nane 1976- |
author_GND | (DE-588)132451956 |
author_facet | Kratzke, Nane 1976- |
author_role | aut |
author_sort | Kratzke, Nane 1976- |
author_variant | n k nk |
building | Verbundindex |
bvnumber | BV049468220 |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)1416408655 (DE-599)DNB1307212611 |
discipline | Informatik |
edition | 2., überarbeitete Auflage |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02809nam a22007338c 4500</leader><controlfield tag="001">BV049468220</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240325 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">231215s2024 gw a||| |||| 00||| ger d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">23,N44</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1307212611</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783446479142</subfield><subfield code="c">: circa EUR 59.99 (DE), circa EUR 61.70 (AT)</subfield><subfield code="9">978-3-446-47914-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3446479147</subfield><subfield code="9">3-446-47914-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783446479142</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 553/47914</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1416408655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1307212611</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BY</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-210</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-2070s</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kratzke, Nane</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132451956</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud-native Computing</subfield><subfield code="b">Software Engineering von Diensten und Applikationen für die Cloud</subfield><subfield code="c">Nane Kratzke</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2., überarbeitete Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">München</subfield><subfield code="b">Hanser</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 375 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">25 cm</subfield><subfield code="e">Enthält: Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "E-Book inklusive"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Automatisierung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CI/CD</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Container</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Deployment-Modelle</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DevOps</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Docker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kubernetes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Microservices</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Private Cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Serverless</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Softwarearchitektur</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FBITARCH: Softwarearchitektur</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FBITITMG: IT-Management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">INF2023</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-446-47925-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-3-446-48029-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034813849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20231025</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034813849</subfield></datafield></record></collection> |
id | DE-604.BV049468220 |
illustrated | Illustrated |
indexdate | 2024-12-20T20:12:57Z |
institution | BVB |
isbn | 9783446479142 3446479147 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034813849 |
oclc_num | 1416408655 |
open_access_boolean | |
owner | DE-210 DE-91G DE-BY-TUM DE-2070s DE-12 DE-523 |
owner_facet | DE-210 DE-91G DE-BY-TUM DE-2070s DE-12 DE-523 |
physical | XI, 375 Seiten Illustrationen, Diagramme 25 cm Enthält: Online-Ressource |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Hanser |
record_format | marc |
spellingShingle | Kratzke, Nane 1976- Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud Cloud Computing (DE-588)7623494-0 gnd Software Engineering (DE-588)4116521-4 gnd Softwareentwicklung (DE-588)4116522-6 gnd Anwendungssoftware (DE-588)4120906-0 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4116521-4 (DE-588)4116522-6 (DE-588)4120906-0 |
title | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud |
title_auth | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud |
title_exact_search | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud |
title_full | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud Nane Kratzke |
title_fullStr | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud Nane Kratzke |
title_full_unstemmed | Cloud-native Computing Software Engineering von Diensten und Applikationen für die Cloud Nane Kratzke |
title_short | Cloud-native Computing |
title_sort | cloud native computing software engineering von diensten und applikationen fur die cloud |
title_sub | Software Engineering von Diensten und Applikationen für die Cloud |
topic | Cloud Computing (DE-588)7623494-0 gnd Software Engineering (DE-588)4116521-4 gnd Softwareentwicklung (DE-588)4116522-6 gnd Anwendungssoftware (DE-588)4120906-0 gnd |
topic_facet | Cloud Computing Software Engineering Softwareentwicklung Anwendungssoftware |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034813849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kratzkenane cloudnativecomputingsoftwareengineeringvondienstenundapplikationenfurdiecloud |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 310 2024 A 78(2) Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |