Cargando…

Securing Hadoop.

This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) wh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Narayanan, Sudheesh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2013.
Colección:Community experience distilled
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn864382730
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 131129s2013 xx o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d MHW  |d YDXCP  |d E7B  |d MEAUC  |d OCLCQ  |d DEBSZ  |d CHVBK  |d N$T  |d OCLCQ  |d COO  |d OCLCQ  |d D6H  |d FEM  |d JBG  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d STF  |d OCLCF  |d VTS  |d ICG  |d INT  |d VT2  |d MFS  |d UKMGB  |d OCLCQ  |d OCLCO  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d M8D  |d UKAHL  |d OCLCQ  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 018006556  |2 Uk 
019 |a 961574805  |a 968039945  |a 969085409  |a 1259231644 
020 |a 1306155517  |q (electronic bk.) 
020 |a 9781306155519  |q (electronic bk.) 
020 |a 9781783285266  |q (electronic bk.) 
020 |a 1783285265  |q (electronic bk.) 
020 |a 9781783285259 
020 |a 1783285257 
029 1 |a AU@  |b 000067092235 
029 1 |a CHNEW  |b 000642523 
029 1 |a CHNEW  |b 000899400 
029 1 |a CHVBK  |b 403392632 
029 1 |a DEBBG  |b BV043777435 
029 1 |a DEBBG  |b BV044064771 
029 1 |a DEBSZ  |b 405524242 
029 1 |a DEBSZ  |b 472804561 
029 1 |a UKMGB  |b 018006556 
029 1 |a AU@  |b 000073089391 
035 |a (OCoLC)864382730  |z (OCoLC)961574805  |z (OCoLC)968039945  |z (OCoLC)969085409  |z (OCoLC)1259231644 
037 |a 546802  |b MIL 
050 4 |a QA76.9.F5 .N384 2013 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.36 
049 |a UAMI 
100 1 |a Narayanan, Sudheesh. 
245 1 0 |a Securing Hadoop. 
260 |b Packt Publishing,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 0 |a Community experience distilled 
520 |a This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts. 
505 0 |a Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop. 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Apache Hadoop. 
630 0 7 |a Apache Hadoop  |2 fast 
650 0 |a Electronic data processing  |x Distributed processing. 
650 0 |a File organization. 
650 6 |a Traitement réparti. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Electronic data processing  |x Distributed processing  |2 fast 
758 |i has work:  |a Securing Hadoop (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYVJb7TP6kGGMTRDB8KxtC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781306155519 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1561454  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26849874 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1561454 
938 |a ebrary  |b EBRY  |n ebr10810886 
938 |a EBSCOhost  |b EBSC  |n 672985 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26827038 
938 |a YBP Library Services  |b YANK  |n 11392299 
994 |a 92  |b IZTAP