Cargando…

Practical Hadoop security /

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lakhe, Bhushan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, [2014?]
Colección:Expert's voice in security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn898213718
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 141217s2014 xx a o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d GW5XE  |d N$T  |d YDXCP  |d E7B  |d CDX  |d COO  |d UMI  |d OCLCF  |d B24X7  |d IDEBK  |d DEBBG  |d EBLCP  |d AZK  |d OCLCQ  |d Z5A  |d LIV  |d MERUC  |d ESU  |d OCLCQ  |d VT2  |d IOG  |d OCLCO  |d CEF  |d DEHBZ  |d OCLCQ  |d OCLCO  |d INT  |d U3W  |d OCLCQ  |d OCLCO  |d WYU  |d UWO  |d YOU  |d OCLCQ  |d OCLCO  |d UAB  |d UKAHL  |d OCLCQ  |d OCLCO  |d DCT  |d ERF  |d OCLCQ  |d WURST  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 900882981  |a 961500715  |a 1005775941  |a 1048115111  |a 1066618809  |a 1086536284  |a 1111022835  |a 1112524451  |a 1129340473  |a 1152993462 
020 |a 9781430265450  |q (electronic bk.) 
020 |a 1430265450  |q (electronic bk.) 
020 |a 1430265442  |q (print) 
020 |a 9781430265443  |q (print) 
020 |z 9781430265443 
024 7 |a 10.1007/978-1-4302-6545-0  |2 doi 
029 1 |a AU@  |b 000056054313 
029 1 |a CHNEW  |b 000890445 
029 1 |a CHVBK  |b 374491623 
029 1 |a DEBBG  |b BV042490986 
029 1 |a DEBBG  |b BV043617617 
029 1 |a DEBSZ  |b 434841633 
029 1 |a GBVCP  |b 882845063 
029 1 |a NLGGC  |b 387106278 
029 1 |a NZ1  |b 15914143 
029 1 |a AU@  |b 000067107592 
035 |a (OCoLC)898213718  |z (OCoLC)900882981  |z (OCoLC)961500715  |z (OCoLC)1005775941  |z (OCoLC)1048115111  |z (OCoLC)1066618809  |z (OCoLC)1086536284  |z (OCoLC)1111022835  |z (OCoLC)1112524451  |z (OCoLC)1129340473  |z (OCoLC)1152993462 
037 |a CL0500000540  |b Safari Books Online 
050 4 |a QA76.9.D314 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UN  |2 bicssc 
072 7 |a UMT  |2 bicssc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Lakhe, Bhushan,  |e author. 
245 1 0 |a Practical Hadoop security /  |c Bhushan Lakhe. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c [2014?] 
264 4 |c ©2014 
300 |a 1 online resource :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a The expert's voice in security. 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed December 23, 2014). 
520 |a Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security? encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use. 
505 0 0 |g Machine generated contents note:  |g ch. 1  |t Understanding Security Concepts --  |t Introducing Security Engineering --  |t Security Engineering Framework --  |t Psychological Aspects of Security Engineering --  |t Introduction to Security Protocols --  |t Securing a Program --  |t Non-Malicious Flaws --  |t Malicious Flaws --  |t Securing a Distributed System --  |t Authentication --  |t Authorization --  |t Encryption --  |t Summary --  |g ch. 2  |t Introducing Hadoop --  |t Hadoop Architecture --  |t HDFS --  |t Inherent Security Issues with HDFS Architecture --  |t Hadoop's Job Framework using MapReduce --  |t Inherent Security Issues with Hadoop's Job Framework --  |t Hadoop's Operational Security Woes --  |t Hadoop Stack --  |t Main Hadoop Components --  |t Summary --  |g ch. 3  |t Introducing Hadoop Security --  |t Starting with Hadoop Security --  |t Introducing Authentication and Authorization for HDFS --  |t Authorization --  |t Real-World Example for Designing Hadoop Authorization --  |t Fine-Grained Authorization for Hadoop --  |t Securely Administering HDFS --  |t Using Hadoop Logging for Security --  |t Monitoring for Security --  |t Tools of the Trade --  |t Encryption: Relevance and Implementation for Hadoop --  |t Encryption for Data in Transit --  |t Encryption for Data at Rest --  |t Summary --  |g ch. 4  |t Open Source Authentication in Hadoop --  |t Pieces of the Security Puzzle --  |t Establishing Secure Client Access --  |t Countering Spoofing with PuTTY's Host Keys --  |t Key-Based Authentication Using PuTTY --  |t Using Passphrases --  |t Building Secure User Authentication --  |t Kerberos Overview --  |t Installing and Configuring Kerberos --  |t Preparing for Kerberos Implementation --  |t Implementing Kerberos for Hadoop --  |t Securing Client-Server Communications --  |t Safe Inter-process Communication --  |t Encrypting HTTP Communication --  |t Securing Data Communication --  |t Summary --  |g ch. 5  |t Implementing Granular Authorization --  |t Designing User Authorization --  |t Call the Cops: A Real-World Security Example --  |t Determine Access Groups and their Access Levels --  |t Implement the Security Model --  |t Access Control Lists for HDFS --  |t Role-Based Authorization with Apache Sentry --  |t Hive Architecture and Authorization Issues --  |t Sentry Architecture --  |t Implementing Roles --  |t Summary --  |g ch. 6  |t Hadoop Logs: Relating and Interpretation --  |t Using Log4j API --  |t Loggers --  |t Appenders --  |t Layout --  |t Filters --  |t Reviewing Hadoop Audit Logs and Daemon Logs --  |t Audit Logs --  |t Hadoop Daemon Logs --  |t Correlating and Interpreting Log Files --  |t What to Correlate? --  |t How to Correlate Using Job Name? --  |t Important Considerations for Logging --  |t Time Synchronization --  |t Hadoop Analytics --  |t Splunk --  |t Summary --  |g ch. 7  |t Monitoring in Hadoop --  |t Overview of a Monitoring System --  |t Simple Monitoring System --  |t Monitoring System for Hadoop --  |t Hadoop Metrics --  |t jvm Context --  |t dfs Context --  |t rpc Context --  |t mapred Context --  |t Metrics and Security --  |t Metrics Filtering --  |t Capturing Metrics Output to File --  |t Security Monitoring with Ganglia and Nagios --  |t Ganglia --  |t Monitoring HBase Using Ganglia --  |t Nagios --  |t Nagios Integration with Ganglia --  |t Nagios Community --  |t Summary --  |g ch. 8  |t Encryption in Hadoop --  |t Introduction to Data Encryption --  |t Popular Encryption Algorithms --  |t Applications of Encryption --  |t Hadoop Encryption Options Overview --  |t Encryption Using Intel's Hadoop Distro --  |t Step-by-Step Implementation --  |t Special Classes Used by Intel Distro --  |t Using Amazon Web Services to Encrypt Your Data --  |t Deciding on a Model for Data Encryption and Storage --  |t Encrypting a Data File Using Selected Model --  |t Summary --  |t Appendix A: Pageant Use and Implementation --  |t Using Pageant --  |t Security Considerations --  |t Appendix B: PuTTY and SSH Implementation for Linux-Based Clients --  |t Using SSH for Remote Access --  |t Appendix C: Setting Up a KeyStore and TrustStore for HTTP Encryption --  |t Create HTTPS Certificates and KeyStore/TrustStore Files --  |t Adjust Permissions for KeyStore/TrustStore Files --  |t Appendix D: Hadoop Metrics and Their Relevance to Security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Apache Hadoop. 
630 0 7 |a Apache Hadoop  |2 fast 
650 0 |a Database security. 
650 0 |a Data encryption (Computer science) 
650 0 |a Data protection. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Database security  |2 fast 
653 0 0 |a computerwetenschappen 
653 0 0 |a computer sciences 
653 0 0 |a databasebeheer 
653 0 0 |a database management 
653 0 0 |a gegevensbeheer 
653 0 0 |a data management 
653 1 0 |a Information and Communication Technology (General) 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
776 0 8 |i Printed edition:  |z 9781430265443 
830 0 |a Expert's voice in security. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430265450/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29395644 
938 |a Books 24x7  |b B247  |n bks00077623 
938 |a Coutts Information Services  |b COUT  |n 30361944 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1964715 
938 |a ebrary  |b EBRY  |n ebr11001102 
938 |a EBSCOhost  |b EBSC  |n 926296 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis30361944 
938 |a YBP Library Services  |b YANK  |n 12224152 
994 |a 92  |b IZTAP