000 | 03187nam a22004455i 4500 | ||
---|---|---|---|
001 | vtls000540458 | ||
003 | RU-ToGU | ||
005 | 20210922081741.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 xxu| s |||| 0|eng d | ||
020 |
_a9781430265450 _9978-1-4302-6545-0 |
||
024 | 7 |
_a10.1007/978-1-4302-6545-0 _2doi |
|
035 | _ato000540458 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aQA76.9.D3 | |
072 | 7 |
_aUN _2bicssc |
|
072 | 7 |
_aUMT _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
100 | 1 |
_aLakhe, Bhushan. _eauthor. _9445007 |
|
245 | 1 | 0 |
_aPractical Hadoop Security _helectronic resource _cby Bhushan Lakhe. |
260 |
_aBerkeley, CA : _bApress : _bImprint: Apress, _c2014. |
||
300 |
_aXVI, 220 p. 88 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
520 | _aPractical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use. | ||
650 | 0 |
_aComputer Science. _9155490 |
|
650 | 0 |
_aData encryption (Computer science). _9566260 |
|
650 | 0 |
_aDatabase management. _9566224 |
|
650 | 1 | 4 |
_aComputer Science. _9155490 |
650 | 2 | 4 |
_aDatabase Management. _9566226 |
650 | 2 | 4 |
_aData Encryption. _9566261 |
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4302-6545-0 |
912 | _aZDB-2-CWD | ||
999 | _c398166 |