Ebook For All Devices Ben Spivey Joey Echeverria Hadoop Security Protecting Your Big Data Platform The Marvelous

Ebook's Language: N/A Some Info: Paperback, 250 pages
Hadoop Security: Protecting Your Big Data Platform
.
Download Format: MOBI, iBook, DJVU, TXT, PDF, DOC, FB2, RTF, ePub Book's Category: "Uncategorised"
User's Rating:
0 ratings
Book Stars: 0.00 of 5 stars
Date of Publication: N/A Original Title: -

E-Book Description:

As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.
Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book's material is immediately applicable to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware from a security standpointGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopUse mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Categories: