Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Hadoop Security

Buy
Practical Hadoop Security, 9781430265443 (1430265442), Apress, 2014

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.

No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples.

The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. 

Practical Hadoop Security:

  • Explains importance of security, auditing and encryption within a Hadoop installation
  • Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
  • Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use

What you’ll learn

  • Understand your options for implementing Hadoop user security
  • Learn how to configure and set up security for your Hadoop cluster
  • Set up Hadoop audit logs, Hadoop metrics, monitoring technologies and related products
  • Configure and set up logging, metrics and monitoring for your Hadoop cluster
  • Discover and implement encryption for data in transit and data at rest
  • and much more.

Who this book is for

Practical Hadoop Security is an excellent resource for Hadoop administrators who want to secure their environment. IT management planning a production Hadoop environment will also find this text useful. This book is also for students who wish to learn about Hadoop security.

Table of Contents

Chapter 1. Understanding Security Concepts

Chapter 2. Introducing Hadoop

Chapter 3. Introducing Hadoop Security

Chapter 4. Open Source Authentication in Hadoop

Chapter 5. Implementing Granular Authorization

Chapter 6. Hadoop Logs: Relating and Interpretation

Chapter 7. Monitoring in Hadoop

Chapter 8. Encryption in Hadoop

 

(HTML tags aren't allowed.)

XPath and XPointer
XPath and XPointer
XML documents contain regular but flexible structures. Developers can use those structures as a framework on which to build powerful transformative and reporting applications, as well as to establish connections between different parts of documents. XPath and XPointer are two W3C-created technologies that make these structures accessible to...
Windows Server 2003 Weekend Crash Course
Windows Server 2003 Weekend Crash Course
Get Up to Speed on Windows Server 2003 – in a Weekend!

The big day is Monday. The day you get to show off what you know about Windows Server 2003. The problem is, you’re not really up to speed. Maybe it’s been a while since you administered a Windows network. Perhaps you’re new to .NET. Or maybe you just like a...

The AMA Handbook of Public Relations
The AMA Handbook of Public Relations

Foreword by Maria Bartiromo

Public relations was among the first industries to harness the power of the Internet. As a medium for corporate communications, branding, product information, and more, the Web's value was readily apparent. But the Internet is a double-edged sword whose perils are every bit as important to...


Light and Lens: Photography in the Digital Age
Light and Lens: Photography in the Digital Age
Light & Lens: Photography in the Digital Age is a groundbreaking introductory book that clearly and concisely provides the instruction and building blocks necessary to create thought-provoking digitally based photographs. It is an adventurous idea book that features numerous classroom-tested assignments and exercises from leading...
Foundations of Quantum Physics
Foundations of Quantum Physics
Our book is meant to be a text for a first undergraduate course in quantum physics. Both of us have taught this course numerous times and have used several different texts, some of them excellent. Obviously, though, there are changes we would make and that is the reason we are writing this book.

Two of the most widely used books for this course...

Tools and Algorithms for the Construction and Analysis of Systems (Lecture Notes in Computer Science)
Tools and Algorithms for the Construction and Analysis of Systems (Lecture Notes in Computer Science)
ETAPS 2007 is the tenth instance of the European Joint Conferences on Theory and Practice of Software, and thus a cause for celebration.

The events that comprise ETAPS address various aspects of the system development process, including specification, design, implementation, analysis and
...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy