As more corporations turn to Hadoop to store and process their most
valuable data, the risk of a potential breach of those systems
increases exponentially. This practical book not only shows Hadoop
administrators and security architects how to protect Hadoop data
from unauthorized access, it also shows how to limit the ability of
an attacker to corrupt or modify data in the event of a security
breach. Authors Ben Spivey and Joey Echeverria provide in-depth
information about the security features available in Hadoop, and
organize them according to common computer security concepts.
You'll also get real-world examples that demonstrate how you can
apply these concepts to your use cases. Understand the challenges
of securing distributed systems, particularly Hadoop Use best
practices for preparing Hadoop cluster hardware as securely as
possible Get an overview of the Kerberos network authentication
protocol Delve into authorization and accounting principles as they
apply to Hadoop Learn how to use mechanisms to protect data in a
Hadoop cluster, both in transit and at rest Integrate Hadoop data
ingest into enterprise-wide security architecture Ensure that
security architecture reaches all the way to end-user access
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!