Authors:
- Practical Hadoop Security is a comprehensive resource for administrators planning a production Hadoop deployment who want to secure and encrypt their Hadoop clusters.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (12 chapters)
-
Front Matter
-
Introducing Hadoop and Its Security
-
Front Matter
-
-
Authenticating and Authorizing Within Your Hadoop Cluster
-
Front Matter
-
-
Audit Logging and Security Monitoring
-
Front Matter
-
-
Encryption for Hadoop
-
Front Matter
-
-
Back Matter
About this book
You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.
No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples.
The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost.Â
Practical Hadoop Security:
- Explains importance of security, auditing and encryption within a Hadoop installation
- Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
- Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use
About the author
Bibliographic Information
Book Title: Practical Hadoop Security
Authors: Bhushan Lakhe
DOI: https://doi.org/10.1007/978-1-4302-6545-0
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)
Copyright Information: Bhushan Lakhe 2014
Softcover ISBN: 978-1-4302-6544-3Published: 09 December 2014
eBook ISBN: 978-1-4302-6545-0Published: 12 December 2014
Edition Number: 1
Number of Pages: XVI, 220
Number of Illustrations: 88 b/w illustrations
Topics: Security, Database Management, Cryptology