Practical Hadoop Security



Bookstore > Books > Practical Hadoop Security

Price$46.98 - $55.94
Rating
AuthorBhushan Lakhe
PublisherApress
Published2014
Pages220
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101430265442
ISBN-139781430265443
EBook Hardcover Paperback

clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.


  1. (2 books)


Similar Books


Practical Hadoop Migration

Practical Hadoop Migration

by Bhushan Lakhe

Re-architect relational applications to NoSQL, integrate relational database management systems with the Hadoop ecosystem, and transform and migrate relational data to and from Hadoop components. This book covers the best-practice design approaches to re-architecting your relational applications and transforming your relational data for u...

Price:  $44.99  |  Publisher:  Apress  |  Release:  2016

Securing Hadoop

Securing Hadoop

by Sudheesh Narayanan

Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in ord...

Price:  $17.99  |  Publisher:  Packt Publishing  |  Release:  2013

Professional Hadoop Solutions

Professional Hadoop Solutions

by Boris Lublinsky, Kevin Smith, Alexey Yakubovich

Today's enterprise architects need to understand how the Hadoop frameworks and APIs fit together, and how they can be integrated to deliver real-world solutions. This book is a practical, detailed guide to building and implementing those solutions, with code-level instruction in the popular Wrox tradition. It covers storing data with...

Price:  $32.99  |  Publisher:  Wrox  |  Release:  2013

Practical Linux Security Cookbook, 2nd Edition

Practical Linux Security Cookbook, 2nd Edition

by Tajinder Kalsi

Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Network Security Through Data Analysis

Network Security Through Data Analysis

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are...

Price:  $47.55  |  Publisher:  O'Reilly Media  |  Release:  2014

Network Security Through Data Analysis, 2nd Edition

Network Security Through Data Analysis, 2nd Edition

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand...

Price:  $30.58  |  Publisher:  O'Reilly Media  |  Release:  2017

Network Scanning Cookbook

Network Scanning Cookbook

by Sairam Jetty

Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.Network...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Mastering OAuth 2.0

Mastering OAuth 2.0

by Charles Bihis

OAuth 2.0 is a powerful authentication and authorization framework that has been adopted as a standard in the technical community. Proper use of this protocol will enable your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. Want ...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2015