Visualizing Google Cloud

by Vergadia, Priyanka

Cloud Computing

Book Details

Book Title

Visualizing Google Cloud

Author

Vergadia, Priyanka

Publisher

Wiley

Publication Date

2022

ISBN

9781119816324

Number of Pages

315

Language

English

Format

PDF

File Size

9.5MB

Subject

cloud-computing

Table of Contents

  • Cover
  • Title Page
  • Introduction
  • Reader Support for This Book
  • Chapter One: Infrastructure
  • Chapter Two: Storage
  • Chapter Three: Databases
  • Relational Databases
  • Nonrelational databases
  • Which One Is Best?
  • How to Set Up Cloud SQL
  • Reliability and Availability
  • Migrating an Existing MySQL Database to Cloud SQL
  • Security and Compliance
  • Cloud SQL in Action
  • How Does Spanner Work?
  • How Does Spanner Provide High Availability and Scalability?
  • How Do Reads and Writes Work?
  • How Does Spanner Provide Global Consistency?
  • What Is Firestore?
  • Document-Model Database
  • How Do You Use Firestore?
  • Some Cloud Bigtable Features
  • Scale and High Availability (HA)
  • How Does It Optimize Throughput?
  • What are Your Application's Availability Needs?
  • Features and Capabilities
  • Use Cases
  • Chapter Four: Data Analytics
  • 5 Steps to Create a Data Analytics Pipeline
  • How Does Pub/Sub Work?
  • Pub/Sub Features
  • Pub/Sub Use Cases
  • Main Components
  • How Does Cloud IoT Core Work?
  • Design Principles of Cloud IoT Core
  • Use Cases
  • How Does Data Processing Work?
  • How to Use Dataflow
  • Dataflow Governance
  • How Does Dataproc Work?
  • Migrating HDFS Data from On-Premises to Google Cloud
  • What Is Data Preparation?
  • How Does Dataprep Work?
  • BigQuery Unique Features
  • How Does It Work?
  • BigQuery Storage Internals
  • Dremel: BigQuery’s query engine
  • Security
  • Cost
  • Data Integration Capabilities
  • How Does Data Catalog Wor?
  • Data Catalog Architecture
  • Data Governance
  • How Does Cloud Composer Work?
  • How to Run Workflows in Cloud Composer
  • Cloud Composer Security Features
  • How Does It Work?
  • Connectivity Options
  • Datastream Use Cases
  • Looker's Platform
  • In-Database Architecture
  • Semantic Modeling Layer
  • Cloud Native
  • Capture
  • Process
  • Store
  • Analyze
  • Use
  • Services Spanning the Pipeline
  • Chapter Five: Application Development And Modernization Opening
  • Building and Modernizing Cloud Applications
  • Microservices or Monolith?
  • What Do Most Microservices Need?
  • Where to Begin?
  • Should You Migrate to Google Cloud?
  • Which Migration Path Is Right for You?
  • Common Cloud Migration Use Cases
  • Why Is Traditional Hybrid and Multicloud Difficult?
  • How Does Anthos Make Hybrid and Multicloud Easy?
  • Deployment Option 1: Google Cloud
  • Deployment Option 2: VMware vSphere
  • Deployment Option 3: Bare-Metal Servers
  • Deployment Option 4: Anthos Attached Clusters
  • Deployment Option 5: AWS
  • Deployment Option 6: Microsoft Azure
  • How Has the Application Development Landscape Changed?
  • What Is Microservices Architecture?
  • How Are Monolithic and Microservices Architectures Different?
  • Microservices Use Cases
  • Service Choreography and Service Orchestration
  • Google Cloud Support for Service Orchestration
  • Google Cloud Support for Service Choreography
  • Additional Services That Help with Both Choreography and Orchestration
  • What Is API Management?
  • What Is Apigee?
  • What is API Gateway?
  • API Gateway Architecture
  • What's the Difference Between API Gateway and Apigee API Management Platform?
  • What Is the Operations Suite?
  • What Does Cloud Operations Include?
  • How Does Cloud Operations Work?
  • Sample Application Architecture
  • Chapter Six: Networking
  • How Is the Google Cloud Physical Network Organized?
  • Cloud Networking Services
  • Premium Tier
  • Standard Tier
  • Choosing a Tier
  • Cloud Interconnect and Cloud VPN
  • Network Connectivity Center
  • Peering
  • CDN Interconnect
  • Features of VPC Networks
  • Shared VPC
  • VPC Network Peering
  • VPC Packet Mirroring
  • How Does DNS Work?
  • What Does Cloud DNS Offer?
  • Hybrid Deployments: DNS Forwarding
  • Hybrid Deployments: Hub and Spoke
  • What Is Cloud Load Balancing?
  • How Does Cloud Load Balancing Work?
  • How to Use Global HTTP(S) Load Balancing
  • How to Secure Your Application with Cloud Load Balancing
  • How to Choose the Right Load-Balancing Option
  • What Is Cloud CDN?
  • How Does Cloud CDN Work?
  • How to Use Cloud CDN
  • Security
  • How Is Cloud NAT Different from Typical NAT Proxies?
  • Benefits of Using Cloud NAT
  • NAT Rules
  • Basic Cloud NAT Configuration Examples
  • Network Topology
  • Connectivity Tests
  • Performance Dashboard
  • Firewall Insights
  • How Does a Typical Service Mesh Work in Kubernetes?
  • How Is Traffic Director Different?
  • How Does Traffic Director Support Proxy-less gRPC and VMs?
  • How Does Traffic Director Work Across Hybrid and Multicloud Environments?
  • Ingress and gateways
  • Why Service Directory?
  • How Service Directory Works with Load Balancer
  • Using Cloud DNS with Service Directory
  • Connect
  • Scale
  • Secure
  • Optimize
  • Modernize
  • Chapter Seven: Data Science, Machine Learning, And Artificial Intelligence
  • Data Engineering
  • Data Analysis
  • Model Development
  • ML Engineering
  • Insights Activation
  • Orchestration
  • Prepackaged AI Solutions
  • Pretrained APIs
  • BigQuery ML
  • Vertex AI
  • End-to-End Model Creation in Vertex AI
  • What Does Vertex AI Include?
  • AutoML Behind the Scenes
  • How Do I Work with AutoML in Vertex AI?
  • What Is MLOps?
  • Vertex AI Pipelines
  • Vertex AI Pipelines Under the Hood
  • Vertex AI Pipelines Open Source Support
  • Benefits of BigQuery ML
  • Supported Models in BigQuery ML
  • How to Use Vision AI
  • What Can I Do with Vision API?
  • How to Use Video AI
  • What Can I Do with the Video Intelligence API?
  • Use Case Scenarios
  • What Is Translation AI?
  • What If Your Business Has Specific Terms?
  • AutoML Translation
  • What Is the Media Translation API?
  • How to Use Natural Language AI
  • What Can I Do with the Natural Language API?
  • What Can I Do with the Speech-to-Text API?
  • How to Use the Speech-to-Text API
  • What Is Contact Center AI?
  • How Does Contact Center AI Work?
  • What Is Document AI?
  • How to Use Document AI
  • Sample Document AI Architecture
  • Vertical Solutions
  • What Is Recommendations AI?
  • Sample Customer Journey with Recommendations AI
  • How Does Recommendations AI Work?
  • Data Engineering
  • Data Analysis
  • Model Development
  • ML Engineering
  • Insights Activation
  • Orchestration
  • Chapter Eight: Security
  • Cloud Security Is Shared Fate
  • Infrastructure Security
  • Network Security
  • Application Security
  • Secure Software Supply Chain Security
  • Data Security
  • Identity and Access Management
  • Endpoint Security
  • Security Monitoring and Operations
  • Governance, Risk, and Compliance
  • Defense in Depth at Scale
  • End-to-End Provenance and Attestation
  • Application Security
  • Risk Points for a Software Supply Chain
  • How Does Google Secure the Software Supply Chain Internally?
  • What is SLSA?
  • How Does Google Cloud Help You Secure Your Software Supply Chain?
  • Encryption
  • At-Rest Encryption Options
  • Other Data Security Services
  • What Is DLP?
  • How Does It Work?
  • A Variety of Deidentification Techniques
  • What Is Cloud Identity?
  • Authentication Options
  • User experience
  • Advantages
  • What Is Cloud IAM?
  • Cloud IAM best practices
  • What Are Service Accounts?
  • Service Account Types
  • Service Account Credentials
  • Service Account Best Practices
  • What Is BeyondCorp?
  • What Is BeyondCorp Enterprise?
  • How Does BeyondCorp Enterprise Work?
  • What Is Security Command Center?
  • How Does Security Command Center work?
  • Infrastructure Security
  • Network Security
  • Application Security
  • Software Supply Chain Security
  • Data Security
  • Identity and Access Management (IAM)
  • Endpoint Security
  • Security Monitoring and Operations
  • Governance, Risk, and Compliance
  • Copyright
  • Dedication
  • Acknowledgments
  • About The Author
  • End User License Agreement