- Understand the challenges of securing distributed systems, particularly Hadoop
- Use best practices for preparing Hadoop cluster hardware as securely as possible
- Get an overview of the Kerberos network authentication protocol
- Delve into authorization and accounting principles as they apply to Hadoop
- Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
- Integrate Hadoop data ingest into enterprise-wide security architecture
- Ensure that security architecture reaches all the way to end-user access
Hadoop Security: Protecting Your Big Data Platform
📄 Viewing lite version
Full site ›
Book Details
Author(s)Spivey, Ben
PublisherO'Reilly Media
ISBN / ASIN1491900989
ISBN-139781491900987
AvailabilityIn stock. Usually ships within 4 to 5 days.
Sales Rank325,006
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.
More Books in Computers
Adobe Dreamweaver Creative Cloud: Comprehensive (Stay …
View
CompTIA Network+ Certification Kit: Exam N10-006
View
Emphasizing Distributed Systems (Volume 53) (Advances …
View
Linux in Plain English
View
Designing Enterprise Applications with the Java(TM) 2 …
View
Distributed .NET Programming in VB .NET
View
Sams Teach Yourself Android Application Development in…
View
Applied Data Communications: A Business-Oriented Appro…
View