Mensys Online Shop

Hadoop Security

Categorie:Algemeen - Digitale Boeken (eBoeken) Van:O'REILLY MEDIA

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the  » Lees meer...

Hadoop Security

Selecteer een of meer artikelen en klik dan op Bestellen. Aantallen kunnen op de volgende blz. gewijzigd worden.
 Hadoop Security
Partnr.OmschrijvingEuro *Euro incl. BTW 
9781491901342 Hadoop Security Protecting Your Big Data Platform 1ed. EPUB331.8238.50
9781491900963 Hadoop Security Protecting Your Big Data Platform 1ed. PDF31.8238.50

Alle prijzen zijn in Euro excl. BTW (21%, voor boeken 6%) en excl. verzendkosten.
Verzenden is gratis bij orders boven de 20 euro in Nederland, daaronder 5 euro excl. BTW.

E-mail of bel 085 40 19 16 0 voor licenties, upgrades en andere vragen.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware as securely as possible
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access