|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn898213718 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
141217s2014 xx a o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d GW5XE
|d N$T
|d YDXCP
|d E7B
|d CDX
|d COO
|d UMI
|d OCLCF
|d B24X7
|d IDEBK
|d DEBBG
|d EBLCP
|d AZK
|d OCLCQ
|d Z5A
|d LIV
|d MERUC
|d ESU
|d OCLCQ
|d VT2
|d IOG
|d OCLCO
|d CEF
|d DEHBZ
|d OCLCQ
|d OCLCO
|d INT
|d U3W
|d OCLCQ
|d OCLCO
|d WYU
|d UWO
|d YOU
|d OCLCQ
|d OCLCO
|d UAB
|d UKAHL
|d OCLCQ
|d OCLCO
|d DCT
|d ERF
|d OCLCQ
|d WURST
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 900882981
|a 961500715
|a 1005775941
|a 1048115111
|a 1066618809
|a 1086536284
|a 1111022835
|a 1112524451
|a 1129340473
|a 1152993462
|
020 |
|
|
|a 9781430265450
|q (electronic bk.)
|
020 |
|
|
|a 1430265450
|q (electronic bk.)
|
020 |
|
|
|a 1430265442
|q (print)
|
020 |
|
|
|a 9781430265443
|q (print)
|
020 |
|
|
|z 9781430265443
|
024 |
7 |
|
|a 10.1007/978-1-4302-6545-0
|2 doi
|
029 |
1 |
|
|a AU@
|b 000056054313
|
029 |
1 |
|
|a CHNEW
|b 000890445
|
029 |
1 |
|
|a CHVBK
|b 374491623
|
029 |
1 |
|
|a DEBBG
|b BV042490986
|
029 |
1 |
|
|a DEBBG
|b BV043617617
|
029 |
1 |
|
|a DEBSZ
|b 434841633
|
029 |
1 |
|
|a GBVCP
|b 882845063
|
029 |
1 |
|
|a NLGGC
|b 387106278
|
029 |
1 |
|
|a NZ1
|b 15914143
|
029 |
1 |
|
|a AU@
|b 000067107592
|
035 |
|
|
|a (OCoLC)898213718
|z (OCoLC)900882981
|z (OCoLC)961500715
|z (OCoLC)1005775941
|z (OCoLC)1048115111
|z (OCoLC)1066618809
|z (OCoLC)1086536284
|z (OCoLC)1111022835
|z (OCoLC)1112524451
|z (OCoLC)1129340473
|z (OCoLC)1152993462
|
037 |
|
|
|a CL0500000540
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D314
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UN
|2 bicssc
|
072 |
|
7 |
|a UMT
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lakhe, Bhushan,
|e author.
|
245 |
1 |
0 |
|a Practical Hadoop security /
|c Bhushan Lakhe.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Apress,
|c [2014?]
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
490 |
1 |
|
|a The expert's voice in security.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed December 23, 2014).
|
520 |
|
|
|a Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security? encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g ch. 1
|t Understanding Security Concepts --
|t Introducing Security Engineering --
|t Security Engineering Framework --
|t Psychological Aspects of Security Engineering --
|t Introduction to Security Protocols --
|t Securing a Program --
|t Non-Malicious Flaws --
|t Malicious Flaws --
|t Securing a Distributed System --
|t Authentication --
|t Authorization --
|t Encryption --
|t Summary --
|g ch. 2
|t Introducing Hadoop --
|t Hadoop Architecture --
|t HDFS --
|t Inherent Security Issues with HDFS Architecture --
|t Hadoop's Job Framework using MapReduce --
|t Inherent Security Issues with Hadoop's Job Framework --
|t Hadoop's Operational Security Woes --
|t Hadoop Stack --
|t Main Hadoop Components --
|t Summary --
|g ch. 3
|t Introducing Hadoop Security --
|t Starting with Hadoop Security --
|t Introducing Authentication and Authorization for HDFS --
|t Authorization --
|t Real-World Example for Designing Hadoop Authorization --
|t Fine-Grained Authorization for Hadoop --
|t Securely Administering HDFS --
|t Using Hadoop Logging for Security --
|t Monitoring for Security --
|t Tools of the Trade --
|t Encryption: Relevance and Implementation for Hadoop --
|t Encryption for Data in Transit --
|t Encryption for Data at Rest --
|t Summary --
|g ch. 4
|t Open Source Authentication in Hadoop --
|t Pieces of the Security Puzzle --
|t Establishing Secure Client Access --
|t Countering Spoofing with PuTTY's Host Keys --
|t Key-Based Authentication Using PuTTY --
|t Using Passphrases --
|t Building Secure User Authentication --
|t Kerberos Overview --
|t Installing and Configuring Kerberos --
|t Preparing for Kerberos Implementation --
|t Implementing Kerberos for Hadoop --
|t Securing Client-Server Communications --
|t Safe Inter-process Communication --
|t Encrypting HTTP Communication --
|t Securing Data Communication --
|t Summary --
|g ch. 5
|t Implementing Granular Authorization --
|t Designing User Authorization --
|t Call the Cops: A Real-World Security Example --
|t Determine Access Groups and their Access Levels --
|t Implement the Security Model --
|t Access Control Lists for HDFS --
|t Role-Based Authorization with Apache Sentry --
|t Hive Architecture and Authorization Issues --
|t Sentry Architecture --
|t Implementing Roles --
|t Summary --
|g ch. 6
|t Hadoop Logs: Relating and Interpretation --
|t Using Log4j API --
|t Loggers --
|t Appenders --
|t Layout --
|t Filters --
|t Reviewing Hadoop Audit Logs and Daemon Logs --
|t Audit Logs --
|t Hadoop Daemon Logs --
|t Correlating and Interpreting Log Files --
|t What to Correlate? --
|t How to Correlate Using Job Name? --
|t Important Considerations for Logging --
|t Time Synchronization --
|t Hadoop Analytics --
|t Splunk --
|t Summary --
|g ch. 7
|t Monitoring in Hadoop --
|t Overview of a Monitoring System --
|t Simple Monitoring System --
|t Monitoring System for Hadoop --
|t Hadoop Metrics --
|t jvm Context --
|t dfs Context --
|t rpc Context --
|t mapred Context --
|t Metrics and Security --
|t Metrics Filtering --
|t Capturing Metrics Output to File --
|t Security Monitoring with Ganglia and Nagios --
|t Ganglia --
|t Monitoring HBase Using Ganglia --
|t Nagios --
|t Nagios Integration with Ganglia --
|t Nagios Community --
|t Summary --
|g ch. 8
|t Encryption in Hadoop --
|t Introduction to Data Encryption --
|t Popular Encryption Algorithms --
|t Applications of Encryption --
|t Hadoop Encryption Options Overview --
|t Encryption Using Intel's Hadoop Distro --
|t Step-by-Step Implementation --
|t Special Classes Used by Intel Distro --
|t Using Amazon Web Services to Encrypt Your Data --
|t Deciding on a Model for Data Encryption and Storage --
|t Encrypting a Data File Using Selected Model --
|t Summary --
|t Appendix A: Pageant Use and Implementation --
|t Using Pageant --
|t Security Considerations --
|t Appendix B: PuTTY and SSH Implementation for Linux-Based Clients --
|t Using SSH for Remote Access --
|t Appendix C: Setting Up a KeyStore and TrustStore for HTTP Encryption --
|t Create HTTPS Certificates and KeyStore/TrustStore Files --
|t Adjust Permissions for KeyStore/TrustStore Files --
|t Appendix D: Hadoop Metrics and Their Relevance to Security.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Apache Hadoop.
|
630 |
0 |
7 |
|a Apache Hadoop
|2 fast
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
653 |
0 |
0 |
|a computerwetenschappen
|
653 |
0 |
0 |
|a computer sciences
|
653 |
0 |
0 |
|a databasebeheer
|
653 |
0 |
0 |
|a database management
|
653 |
0 |
0 |
|a gegevensbeheer
|
653 |
0 |
0 |
|a data management
|
653 |
1 |
0 |
|a Information and Communication Technology (General)
|
653 |
1 |
0 |
|a Informatie- en communicatietechnologie (algemeen)
|
776 |
0 |
8 |
|i Printed edition:
|z 9781430265443
|
830 |
|
0 |
|a Expert's voice in security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781430265450/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29395644
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00077623
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 30361944
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1964715
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11001102
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 926296
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis30361944
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12224152
|
994 |
|
|
|a 92
|b IZTAP
|