Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Hadoop

Buy
Securing Hadoop, 9781783285259 (1783285257), Packt Publishing, 2013

Implement robust end-to-end security for your Hadoop ecosystem

Overview

  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • Administer the auditing and security event monitoring system

In Detail

Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.

This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.

This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.

What you will learn from this book

  • Understand the challenges of securing Hadoop and Big Data and master the reference architecture for Big Data security
  • Demystify Kerberos and the Hadoop security model
  • Learn the steps to secure a Hadoop platform with Kerberos
  • Integrate Enterprise Security Systems with Hadoop security and build an integrated security model
  • Get detailed insights into securing sensitive data in a Hadoop Big Data platform
  • Implement audit logging and a security event monitoring system for your Big Data platform
  • Discover the various industry tools and vendors that can be used to build a secured Hadoop platform
  • Recognize how the various Hadoop components interact with each other and what protocols and security they implement
  • Design a secure Hadoop infrastructure and implement the various security controls within the enterprise.

Approach

This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.

Who this book is written for

This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It’s assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

(HTML tags aren't allowed.)

Teach Yourself Borland C++ Builder in 14 Days
Teach Yourself Borland C++ Builder in 14 Days

By now you know that C++Builder is Borland’s hot new rapid application development (RAD) product for writing C++ applications. With C++Builder you can write C++ Windows programs more quickly and more easily than was ever possible before. You can create Win32 console applications or Win32 GUI (graphical user interface) programs. When...

End-to-End Game Development: Creating Independent Serious Games and Simulations from Start to Finish
End-to-End Game Development: Creating Independent Serious Games and Simulations from Start to Finish

In the award-winning AMC television series Mad Men, set in the early 1960s, a mysterious and massive machine shows up one day in the offices of the advertising agency Stirling Cooper. The machine is a Xerox photocopier, and the workplace is about to change forever. Previously, document duplication was done with a mimeograph, a hand-cranked...

Practical Image and Video Processing Using MATLAB
Practical Image and Video Processing Using MATLAB

UP-TO-DATE, TECHNICALLY ACCURATE COVERAGE OF ESSENTIAL TOPICS IN IMAGE AND VIDEO PROCESSING

This is the first book to combine image and video processing with a practical MATLAB®-oriented approach in order to demonstrate the most important image and video techniques and algorithms. Utilizing minimal...


Computer Science Logo Style 2/e, Vol. 1: Symbolic Computing
Computer Science Logo Style 2/e, Vol. 1: Symbolic Computing
This book isn’t for everyone.

Not everyone needs to program computers. There is a popular myth that if you
aren’t “computer literate,” whatever that means, then you’ll flunk out of college, you’ll
never get a job, and you’ll be poor and miserable all your life. The myth is promoted
...
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
Why Don't I Feel Good Enough?
Why Don't I Feel Good Enough?

Why Don’t I Feel Good Enough? Using Attachment Theory to Find a Solution offers a guide to how early emotional bonds affect our adult relationships and how psychological theory can help us to find the origin and solution to a number of life’s problems.

Bringing a wealth of therapeutic experience and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy