首页 > 其他 > 详细

Architecture Books

时间:2019-03-24 00:47:49      阅读:225      评论:0      收藏:0      [点我收藏+]

1. Cloud Computing Architecture

 

book to read:

 

 

1.1 基础理论

 

 

1.1.1 操作系统

 

 

1.2 分布式系统

 

 

1.3 SDN

 

  • SDN网络指南
  • [现代网络技术:SDN、NFV、QoE、物联网和云计算]

 

1.4 中间件和数据库

 

  • Introduction to Middleware: Web Services, Object Components, and Cloud Computing
  • [Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends]
  • [Distributed Systems for System Architects (Advances in Distributed Computing and Middleware)]
  • [Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition]
  • [HBase: The Definitive Guide: Random Access to Your Planet-Size Data]

 

1.5 IoT

 

 

1.6 SDS

 

  • [Mastering Ceph: Redefine your storage system]
  • [Ceph: Designing and Implementing Scalable Storage Systems: Design, implement, and manage software-defined storage solutions that provide excellent performance]

 

2. Private Cloud Architecture

 

 

3. Hybrid Cloud Architecture

 

 

4. Multi-Cloud Architecture

 

  • [Multi-Cloud for Architects: Grow your IT business by means of a multi-cloud strategy]
  • [Multicloud Management a Complete Guide]
  • [Model-Driven Development and Operation of Multi-Cloud Applications: The MODAClouds Approach]
  • [The Cloud Adoption Playbook: Proven Strategies for Transforming Your Organization with the Cloud]
  • [Multicloud a Clear and Concise Reference]
  • [Multicloud Architectures the Ultimate Step-By-Step Guide]
  • [Redundant Multicloud the Ultimate Step-By-Step Guide]
  • [Automated Multicloud Third Edition]
  • [Multicloud Strategies the Ultimate Step-By-Step Guide]
  • [Multicloud Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics]

 

5 BigData & ML

 

 

6 Cloud Security Architecture

 

books to read

 

 

6.1 云安全总体架构

 

 

6.2 Security Architecture Resource

 

 

6.2.0 SDP

 

 

6.2.1 操作系统安全

 

 

6.2.2 虚拟化安全

 

 

6.2.3 容器安全

 

 

6.2.2 基础设施和网络安全

 

 

6.2.3 中间件和数据库安全

 

  • [Spring Security - Third Edition: Secure your web applications, RESTful services, and microservice architectures]
  • [Database security: Complete Self-Assessment Guide]

 

6.2.4 大数据安全

 

 

6.2.5 IOT与边缘计算

 

 

6.2.6 渗透与攻防对抗

 

  • Advanced Penetration Testing For Highly-Secured Environments
  • [Security Controls Evaluation, Testing, and Assessment Handbook]
  • [Penetration Testing: A Hands-On Introduction to Hacking]
  • [Hands-On AWS Penetration Testing with Kali Linux: Set-up a virtual lab and pentest major AWS services such as EC2, S3, Lambda, CloudFormation, and more]
  • [Advanced Penetration Testing: Hacking the World‘s Most Secure Networks]
  • [Computer Security and Penetration Testing]
  • [The Hacker Playbook: Practical Guide To Penetration Testing]
  • [The Hacker Playbook 2: Practical Guide To Penetration Testing]
  • [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers]
  • [Hacking: The Art of Exploitation, 2nd Edition]
  • [The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy]
  • [Practical Lock Picking: A Physical Penetration Tester‘s Training Guide]
  • [Ethical Hacking and Penetration Testing Guide]

 

6.2.7 安全研发

 

 

6.2.8 安全智能

 

  • Network Security Through Data Analysis: From Data to Action
  • Machine Learning and Security: Protecting Systems with Data and Algorithms
  • [Intelligence-Driven Incident Response: Outwitting the Adversary]
  • Cyber Threat Intelligence
  • [Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem]
  • [Adversarial Machine Learning]
  • [Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python]
  • [Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan]
  • Effective Threat Intelligence: Building and running an intel team for your organization
  • Threat Intelligence and Me: A Book for Children and Analysts
  • Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
  • Applied Network Security Monitoring: Collection, Detection, and Analysis
  • Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
  • Windows Security Monitoring: Scenarios and Patterns
  • The Tao of Network Security Monitoring: Beyond Intrusion Detection
  • Security Intelligence: A Practitioner‘s Guide to Solving Enterprise Security Challenges
  • Analyzing Intelligence: National Security Practitioners‘ Perspectives
  • The Assault on Intelligence: American National Security in an Age of Lies
  • National Security Intelligence
  • The Oxford Handbook of National Security Intelligence
  • The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
  • Introduction to Artificial Intelligence for Security Professionals
  • AI in Cybersecurity
  • Network Intrusion Detection using Deep Learning: A Feature Learning Approach
  • Next Level Cybersecurity: Detect the Signals, Stop the Hack
  • Artificial Intelligence Safety and Security
  • Secure and Smart Internet of Things (IoT): Using Blockchain and AI
  • Protective Intelligence and Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials
  • How to Define and Build an Effective Cyber Threat Intelligence Capability
  • Darkweb Cyber Threat Intelligence Mining
  • The Threat Hunt Process (THP) Roadmap: A Pathway for Advanced Cybersecurity Active Measures
  • Handbook of Warning Intelligence: Assessing the Threat to National Security

 

6.2.9 Cloud Forensic

 

 

7. 稳定性架构

 

7.1 基础理论

 

 

7.2 商务可持续性

 

 

7.3 系统模型设计

 

  • ABAC权限控制模型

 

7.4 硬件

 

7.5 云设施

 

 

7.6 操作系统

 

 

7.7 数据库与中间件

 

  • [Database Reliability Engineering: Designing and Operating Resilient Database Systems]
  • [MySQL High Availability: Tools for Building Robust Data Centers]
  • [PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance]
  • [PostgreSQL High Availability Cookbook - Second Edition]
  • [Introducing InnoDB Cluster: Learning the MySQL High Availability Stack]
  • [Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard]
  • [SQL Server 2016 High Availability Unleashed (includes Content Update Program)]
  • [Oracle High Availability, Disaster Recovery, and Cloud Services: Explore RAC, Data Guard, and Cloud Technology]
  • [MongoDB High Availability]
  • [Pro MySQL NDB Cluster]
  • [High Performance MySQL: Optimization, Backups, Replication, and More]

 

7.8 大数据

 

  • [Cassandra High Availability]
  • [Cassandra 3.x High Availability - Second Edition]

 

7.9 应用

 

  • Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
  • [Implementing Azure Cloud Design Patterns: Implement efficient design patterns for data management, high availability, monitoring and other popular patterns on your Azure Cloud]
  • [Exploring CQRS and Event Sourcing: A journey into high scalability, availability, and maintainability with Windows Azure]
  • [JBoss EAP6 High Availability]
  • [Load Balancing with HAProxy: Open-source technology for better scalability, redundancy and availability in your IT infrastructure]
  • [The Site Reliability Workbook: Practical Ways to Implement SRE]
  • [Site Reliability Engineering: How Google Runs Production Systems]
  • [High Availability for the LAMP Stack: Eliminate Single Points of Failure and Increase Uptime for Your Linux, Apache, MySQL, and PHP Based Web Applications]
  • [Architecting High Performing, Scalable and Available Enterprise Web Applications]

 

7.10 基础网络设施

 

  • [High Availability Network Fundamentals]
  • [JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)]
  • [High Availability Provisioning Strategies For Broadband & Next Generation Access Networks: Focused on DOCSIS Network]
  • [ShoreTel Business Continuity Best Practices: Resiliency, High Availability and Disaster Planning with a ShoreTel IP-PBX]
  • [High Availability Asterisk Pbx:: Proven Method]
  • [Network Infrastructure and Architecture: Designing High-Availability Networks]
  • [High Availability Networking with Cisco]

 

7.11 灾难恢复

 

  • Planning Cloud-Based Disaster Recovery for Digital Assets: The Innovative Librarian‘s Guide
  • The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
  • [Principles of Incident Response and Disaster Recovery]
  • [Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager]
  • [Disaster Recovery]
  • Disaster Response and Recovery: Strategies and Tactics for Resilience
  • [IT Disaster Recovery Planning For Dummies]
  • [Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager - Second Edition]
  • [Guide to Disaster Recovery]
  • [The Disaster Recovery Handbook & Household Inventory Guide]
  • [The Red Guide to Recovery - Resource Handbook for Disaster Survivors]
  • [Disaster and Recovery Planning: A Guide for Facility Managers, Sixth Edition]
  • [Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference]
  • [Emergency Preparedness and Disaster Recovery in School Libraries: Creating a Safe Haven]
  • [Disaster Recovery: Principles and Practices]
  • [Disaster Recovery Planning: Preparing for the Unthinkable (3rd Edition)]
  • [Winsor Consult Group - Disaster Recovery Guide: A Best Practice Guide for Disaster Recovery Programs]
  • [The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets]
  • [Principles of Incident Response and Disaster Recovery 2nd (second) Edition by Whitman, Michael E., Mattord, Herbert J., Green, Andrew published by Cengage Learning (2013)]
  • [Technology Disaster Response and Recovery Planning: A LITA Guide]
  • [Disaster Response and Recovery]

 

7.12 数据中心

 

  • [Data Protection for Virtual Data Centers]
  • [CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)]

 

7.13 DevOps

 

 

7.13.1 AiOps:

 

  • [Aiops Architecture Second Edition]
  • [Artificial Intelligence for It Operations Aiops Platforms Third Edition]
  • [Aiops Platform Third Edition]
  • [Analytics and Aiops Standard Requirements]
  • [Aiops Augmentation the Ultimate Step-By-Step Guide]

 

7.14 软件过程改进

 

 

7.15 Reliability:系统可靠性

 

 

8. Cloud Application Architecture

 

 

10. Product Architecture

 

  • System Architecture: Strategy and Product Development for Complex Systems

 

10. Enterprise Architecture Frameworks

 

 

Enterprise architecture framework

Architecture Books

原文:https://www.cnblogs.com/dhcn/p/10586613.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!