|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn914166296 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150720s2015 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d COO
|d OCLCF
|d DEBBG
|d DEBSZ
|d FEM
|d VT2
|d CEF
|d WYU
|d UAB
|d UKAHL
|d DST
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 968007563
|a 968998223
|
020 |
|
|
|a 9781491900970
|
020 |
|
|
|a 1491900970
|
020 |
|
|
|a 1491900989
|
020 |
|
|
|a 9781491900987
|
020 |
|
|
|a 9781491901342
|
020 |
|
|
|a 1491901349
|
020 |
|
|
|z 9781491900987
|
029 |
1 |
|
|a DEBBG
|b BV043019672
|
029 |
1 |
|
|a DEBSZ
|b 455692432
|
029 |
1 |
|
|a GBVCP
|b 882741667
|
035 |
|
|
|a (OCoLC)914166296
|z (OCoLC)968007563
|z (OCoLC)968998223
|
037 |
|
|
|a CL0500000616
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D5
|
082 |
0 |
4 |
|a 005.74
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Spivey, Ben,
|e author.
|
245 |
1 |
0 |
|a Hadoop security /
|c Ben Spivey & Joey Echeverria.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed July 9, 2015).
|
500 |
|
|
|a "Protecting your big data platform"--Cover page
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access.
|
505 |
0 |
|
|a Copyright -- Table of Contents -- Foreword -- Preface -- Audience -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- From Joey -- From Ben -- From Eddie -- Disclaimer -- Chapter 1. Introduction -- Security Overview -- Confidentiality -- Integrity -- Availability -- Authentication, Authorization, and Accounting -- Hadoop Security: A Brief History -- Hadoop Components and Ecosystem -- Apache HDFS -- Apache YARN -- Apache MapReduce -- Apache Hive -- Cloudera Impala
|
505 |
8 |
|
|a Apache Sentry (Incubating)Apache HBase -- Apache Accumulo -- Apache Solr -- Apache Oozie -- Apache ZooKeeper -- Apache Flume -- Apache Sqoop -- Cloudera Hue -- Summary -- Part I. Security Architecture -- Chapter 2. Securing Distributed Systems -- Threat Categories -- Unauthorized Access/Masquerade -- Insider Threat -- Denial of Service -- Threats to Data -- Threat and Risk Assessment -- User Assessment -- Environment Assessment -- Vulnerabilities -- Defense in Depth -- Summary -- Chapter 3. System Architecture -- Operating Environment
|
505 |
8 |
|
|a Network SecurityNetwork Segmentation -- Network Firewalls -- Intrusion Detection and Prevention -- Hadoop Roles and Separation Strategies -- Master Nodes -- Worker Nodes -- Management Nodes -- Edge Nodes -- Operating System Security -- Remote Access Controls -- Host Firewalls -- SELinux -- Summary -- Chapter 4. Kerberos -- Why Kerberos? -- Kerberos Overview -- Kerberos Workflow: A Simple Example -- Kerberos Trusts -- MIT Kerberos -- Server Configuration -- Client Configuration -- Summary
|
505 |
8 |
|
|a Part II. Authentication, Authorization, and AccountingChapter 5. Identity and Authentication -- Identity -- Mapping Kerberos Principals to Usernames -- Hadoop User to Group Mapping -- Provisioning of Hadoop Users -- Authentication -- Kerberos -- Username and Password Authentication -- Tokens -- Impersonation -- Configuration -- Summary -- Chapter 6. Authorization -- HDFS Authorization -- HDFS Extended ACLs -- Service-Level Authorization -- MapReduce and YARN Authorization -- MapReduce (MR1) -- YARN (MR2) -- ZooKeeper ACLs -- Oozie Authorization
|
505 |
8 |
|
|a HBase and Accumulo AuthorizationSystem, Namespace, and Table-Level Authorization -- Column- and Cell-Level Authorization -- Summary -- Chapter 7. Apache Sentry (Incubating) -- Sentry Concepts -- The Sentry Service -- Sentry Service Configuration -- Hive Authorization -- Hive Sentry Configuration -- Impala Authorization -- Impala Sentry Configuration -- Solr Authorization -- Solr Sentry Configuration -- Sentry Privilege Models -- SQL Privilege Model -- Solr Privilege Model -- Sentry Policy Administration -- SQL Commands -- SQL Policy File
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Apache Hadoop.
|
630 |
0 |
7 |
|a Apache Hadoop.
|2 fast
|0 (OCoLC)fst01911570
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Database security.
|2 fast
|0 (OCoLC)fst00888063
|
700 |
1 |
|
|a Echeverria, Joey,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491900970/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH29060403
|
994 |
|
|
|a 92
|b IZTAP
|