Hadoop Security

Protecting Your Big Data Platform

Nonfiction, Computers, Database Management, Data Processing
Cover of the book Hadoop Security by Ben  Spivey, Joey  Echeverria, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ben Spivey, Joey Echeverria ISBN: 9781491901342
Publisher: O'Reilly Media Publication: June 29, 2015
Imprint: O'Reilly Media Language: English
Author: Ben Spivey, Joey Echeverria
ISBN: 9781491901342
Publisher: O'Reilly Media
Publication: June 29, 2015
Imprint: O'Reilly Media
Language: English

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware as securely as possible
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

More books from O'Reilly Media

Cover of the book Unix for Oracle DBAs Pocket Reference by Ben  Spivey, Joey  Echeverria
Cover of the book HBase: The Definitive Guide by Ben  Spivey, Joey  Echeverria
Cover of the book Head First HTML5 Programming by Ben  Spivey, Joey  Echeverria
Cover of the book ActionScript Developer's Guide to PureMVC by Ben  Spivey, Joey  Echeverria
Cover of the book Web 2.0: A Strategy Guide by Ben  Spivey, Joey  Echeverria
Cover of the book Data Science with Java by Ben  Spivey, Joey  Echeverria
Cover of the book YouTube: An Insider's Guide to Climbing the Charts by Ben  Spivey, Joey  Echeverria
Cover of the book DevOps with OpenShift by Ben  Spivey, Joey  Echeverria
Cover of the book Microsoft Project 2010: The Missing Manual by Ben  Spivey, Joey  Echeverria
Cover of the book Facebook Cookbook by Ben  Spivey, Joey  Echeverria
Cover of the book Windows Server 2003 Network Administration by Ben  Spivey, Joey  Echeverria
Cover of the book High Performance Images by Ben  Spivey, Joey  Echeverria
Cover of the book TensorFlow for Deep Learning by Ben  Spivey, Joey  Echeverria
Cover of the book Building iPhone and iPad Electronic Projects by Ben  Spivey, Joey  Echeverria
Cover of the book StartWithXML: Making the Case for Applying XML to a Publishing Workflow by Ben  Spivey, Joey  Echeverria
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy