1. Cloud Computing Architecture
book to read:
1.1 基础理论
1.1.1 操作系统
1.2 分布式系统
1.3 SDN
- SDN网络指南
- [现代网络技术:SDN、NFV、QoE、物联网和云计算]
1.4 中间件和数据库
- Introduction to Middleware: Web Services, Object Components, and Cloud Computing
- [Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends]
- [Distributed Systems for System Architects (Advances in Distributed Computing and Middleware)]
- [Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition]
- [HBase: The Definitive Guide: Random Access to Your Planet-Size Data]
1.5 IoT
1.6 SDS
- [Mastering Ceph: Redefine your storage system]
- [Ceph: Designing and Implementing Scalable Storage Systems: Design, implement, and manage software-defined storage solutions that provide excellent performance]
2. Private Cloud Architecture
3. Hybrid Cloud Architecture
4. Multi-Cloud Architecture
- [Multi-Cloud for Architects: Grow your IT business by means of a multi-cloud strategy]
- [Multicloud Management a Complete Guide]
- [Model-Driven Development and Operation of Multi-Cloud Applications: The MODAClouds Approach]
- [The Cloud Adoption Playbook: Proven Strategies for Transforming Your Organization with the Cloud]
- [Multicloud a Clear and Concise Reference]
- [Multicloud Architectures the Ultimate Step-By-Step Guide]
- [Redundant Multicloud the Ultimate Step-By-Step Guide]
- [Automated Multicloud Third Edition]
- [Multicloud Strategies the Ultimate Step-By-Step Guide]
- [Multicloud Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics]
5 BigData & ML
6 Cloud Security Architecture
books to read
6.1 云安全总体架构
6.2 Security Architecture Resource
6.2.0 SDP
6.2.1 操作系统安全
6.2.2 虚拟化安全
6.2.3 容器安全
6.2.2 基础设施和网络安全
6.2.3 中间件和数据库安全
- [Spring Security - Third Edition: Secure your web applications, RESTful services, and microservice architectures]
- [Database security: Complete Self-Assessment Guide]
6.2.4 大数据安全
6.2.5 IOT与边缘计算
6.2.6 渗透与攻防对抗
- Advanced Penetration Testing For Highly-Secured Environments
- [Security Controls Evaluation, Testing, and Assessment Handbook]
- [Penetration Testing: A Hands-On Introduction to Hacking]
- [Hands-On AWS Penetration Testing with Kali Linux: Set-up a virtual lab and pentest major AWS services such as EC2, S3, Lambda, CloudFormation, and more]
- [Advanced Penetration Testing: Hacking the World‘s Most Secure Networks]
- [Computer Security and Penetration Testing]
- [The Hacker Playbook: Practical Guide To Penetration Testing]
- [The Hacker Playbook 2: Practical Guide To Penetration Testing]
- [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers]
- [Hacking: The Art of Exploitation, 2nd Edition]
- [The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy]
- [Practical Lock Picking: A Physical Penetration Tester‘s Training Guide]
- [Ethical Hacking and Penetration Testing Guide]
6.2.7 安全研发
6.2.8 安全智能
- Network Security Through Data Analysis: From Data to Action
- Machine Learning and Security: Protecting Systems with Data and Algorithms
- [Intelligence-Driven Incident Response: Outwitting the Adversary]
- Cyber Threat Intelligence
- [Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem]
- [Adversarial Machine Learning]
- [Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python]
- [Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan]
- Effective Threat Intelligence: Building and running an intel team for your organization
- Threat Intelligence and Me: A Book for Children and Analysts
- Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
- Windows Security Monitoring: Scenarios and Patterns
- The Tao of Network Security Monitoring: Beyond Intrusion Detection
- Security Intelligence: A Practitioner‘s Guide to Solving Enterprise Security Challenges
- Analyzing Intelligence: National Security Practitioners‘ Perspectives
- The Assault on Intelligence: American National Security in an Age of Lies
- National Security Intelligence
- The Oxford Handbook of National Security Intelligence
- The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- Introduction to Artificial Intelligence for Security Professionals
- AI in Cybersecurity
- Network Intrusion Detection using Deep Learning: A Feature Learning Approach
- Next Level Cybersecurity: Detect the Signals, Stop the Hack
- Artificial Intelligence Safety and Security
- Secure and Smart Internet of Things (IoT): Using Blockchain and AI
- Protective Intelligence and Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials
- How to Define and Build an Effective Cyber Threat Intelligence Capability
- Darkweb Cyber Threat Intelligence Mining
- The Threat Hunt Process (THP) Roadmap: A Pathway for Advanced Cybersecurity Active Measures
- Handbook of Warning Intelligence: Assessing the Threat to National Security
6.2.9 Cloud Forensic
7. 稳定性架构
7.1 基础理论
7.2 商务可持续性
7.3 系统模型设计
7.4 硬件
7.5 云设施
7.6 操作系统
7.7 数据库与中间件
- [Database Reliability Engineering: Designing and Operating Resilient Database Systems]
- [MySQL High Availability: Tools for Building Robust Data Centers]
- [PostgreSQL 10 High Performance: Expert techniques for query optimization, high availability, and efficient database maintenance]
- [PostgreSQL High Availability Cookbook - Second Edition]
- [Introducing InnoDB Cluster: Learning the MySQL High Availability Stack]
- [Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard]
- [SQL Server 2016 High Availability Unleashed (includes Content Update Program)]
- [Oracle High Availability, Disaster Recovery, and Cloud Services: Explore RAC, Data Guard, and Cloud Technology]
- [MongoDB High Availability]
- [Pro MySQL NDB Cluster]
- [High Performance MySQL: Optimization, Backups, Replication, and More]
7.8 大数据
- [Cassandra High Availability]
- [Cassandra 3.x High Availability - Second Edition]
7.9 应用
- Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
- [Implementing Azure Cloud Design Patterns: Implement efficient design patterns for data management, high availability, monitoring and other popular patterns on your Azure Cloud]
- [Exploring CQRS and Event Sourcing: A journey into high scalability, availability, and maintainability with Windows Azure]
- [JBoss EAP6 High Availability]
- [Load Balancing with HAProxy: Open-source technology for better scalability, redundancy and availability in your IT infrastructure]
- [The Site Reliability Workbook: Practical Ways to Implement SRE]
- [Site Reliability Engineering: How Google Runs Production Systems]
- [High Availability for the LAMP Stack: Eliminate Single Points of Failure and Increase Uptime for Your Linux, Apache, MySQL, and PHP Based Web Applications]
- [Architecting High Performing, Scalable and Available Enterprise Web Applications]
7.10 基础网络设施
- [High Availability Network Fundamentals]
- [JUNOS High Availability: Best Practices for High Network Uptime (Animal Guide)]
- [High Availability Provisioning Strategies For Broadband & Next Generation Access Networks: Focused on DOCSIS Network]
- [ShoreTel Business Continuity Best Practices: Resiliency, High Availability and Disaster Planning with a ShoreTel IP-PBX]
- [High Availability Asterisk Pbx:: Proven Method]
- [Network Infrastructure and Architecture: Designing High-Availability Networks]
- [High Availability Networking with Cisco]
7.11 灾难恢复
- Planning Cloud-Based Disaster Recovery for Digital Assets: The Innovative Librarian‘s Guide
- The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
- [Principles of Incident Response and Disaster Recovery]
- [Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager]
- [Disaster Recovery]
- Disaster Response and Recovery: Strategies and Tactics for Resilience
- [IT Disaster Recovery Planning For Dummies]
- [Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager - Second Edition]
- [Guide to Disaster Recovery]
- [The Disaster Recovery Handbook & Household Inventory Guide]
- [The Red Guide to Recovery - Resource Handbook for Disaster Survivors]
- [Disaster and Recovery Planning: A Guide for Facility Managers, Sixth Edition]
- [Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference]
- [Emergency Preparedness and Disaster Recovery in School Libraries: Creating a Safe Haven]
- [Disaster Recovery: Principles and Practices]
- [Disaster Recovery Planning: Preparing for the Unthinkable (3rd Edition)]
- [Winsor Consult Group - Disaster Recovery Guide: A Best Practice Guide for Disaster Recovery Programs]
- [The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets]
- [Principles of Incident Response and Disaster Recovery 2nd (second) Edition by Whitman, Michael E., Mattord, Herbert J., Green, Andrew published by Cengage Learning (2013)]
- [Technology Disaster Response and Recovery Planning: A LITA Guide]
- [Disaster Response and Recovery]
7.12 数据中心
- [Data Protection for Virtual Data Centers]
- [CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902)]
7.13 DevOps
7.13.1 AiOps:
- [Aiops Architecture Second Edition]
- [Artificial Intelligence for It Operations Aiops Platforms Third Edition]
- [Aiops Platform Third Edition]
- [Analytics and Aiops Standard Requirements]
- [Aiops Augmentation the Ultimate Step-By-Step Guide]
7.14 软件过程改进
7.15 Reliability:系统可靠性
8. Cloud Application Architecture
10. Product Architecture
- System Architecture: Strategy and Product Development for Complex Systems
10. Enterprise Architecture Frameworks
Architecture Books
原文:https://www.cnblogs.com/dhcn/p/10586613.html