Book Image

Distributed Computing in Java 9

Book Image

Distributed Computing in Java 9

Overview of this book

Distributed computing is the concept with which a bigger computation process is accomplished by splitting it into multiple smaller logical activities and performed by diverse systems, resulting in maximized performance in lower infrastructure investment. This book will teach you how to improve the performance of traditional applications through the usage of parallelism and optimized resource utilization in Java 9. After a brief introduction to the fundamentals of distributed and parallel computing, the book moves on to explain different ways of communicating with remote systems/objects in a distributed architecture. You will learn about asynchronous messaging with enterprise integration and related patterns, and how to handle large amount of data using HPC and implement distributed computing for databases. Moving on, it explains how to deploy distributed applications on different cloud platforms and self-contained application development. You will also learn about big data technologies and understand how they contribute to distributed computing. The book concludes with the detailed coverage of testing, debugging, troubleshooting, and security aspects of distributed applications so the programs you build are robust, efficient, and secure.
Table of Contents (17 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Customer Feedback
2
Communication between Distributed Applications
3
RMI, CORBA, and JavaSpaces

Cloud computing security


Cloud computing security refers to the set of techniques, protection controls, and security policy to secure the application, data, and related infrastructure components on the cloud infrastructure.

While the introduction of cloud computing and big data in organizations helps solve the maintenance overhead of on premise software, platform, and/or infrastructure, this model also reminds us of the security concerns as aforementioned are being maintained on third-party data centers. Even though the cloud application providers are coming up their own security features, application teams should ensure that their components are deployed with application security in the cloud practice.

Cloud security controls such as deterrent, preventive, detective, and corrective controls are referred by security management to address the cloud security issues.

Different security policies such as identity management (SSO/CloudID) and the physical and privacy policy (data masking / encryption...