Cargando…

Hadoop security /

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also sh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Spivey, Ben (Autor), Echeverria, Joey (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2015.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn914166296
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150720s2015 caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d COO  |d OCLCF  |d DEBBG  |d DEBSZ  |d FEM  |d VT2  |d CEF  |d WYU  |d UAB  |d UKAHL  |d DST  |d OCLCO  |d OCLCQ 
019 |a 968007563  |a 968998223 
020 |a 9781491900970 
020 |a 1491900970 
020 |a 1491900989 
020 |a 9781491900987 
020 |a 9781491901342 
020 |a 1491901349 
020 |z 9781491900987 
029 1 |a DEBBG  |b BV043019672 
029 1 |a DEBSZ  |b 455692432 
029 1 |a GBVCP  |b 882741667 
035 |a (OCoLC)914166296  |z (OCoLC)968007563  |z (OCoLC)968998223 
037 |a CL0500000616  |b Safari Books Online 
050 4 |a QA76.9.D5 
082 0 4 |a 005.74 
049 |a UAMI 
100 1 |a Spivey, Ben,  |e author. 
245 1 0 |a Hadoop security /  |c Ben Spivey & Joey Echeverria. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (Safari, viewed July 9, 2015). 
500 |a "Protecting your big data platform"--Cover page 
500 |a Includes index. 
520 |a As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access. 
505 0 |a Copyright -- Table of Contents -- Foreword -- Preface -- Audience -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- From Joey -- From Ben -- From Eddie -- Disclaimer -- Chapter 1. Introduction -- Security Overview -- Confidentiality -- Integrity -- Availability -- Authentication, Authorization, and Accounting -- Hadoop Security: A Brief History -- Hadoop Components and Ecosystem -- Apache HDFS -- Apache YARN -- Apache MapReduce -- Apache Hive -- Cloudera Impala 
505 8 |a Apache Sentry (Incubating)Apache HBase -- Apache Accumulo -- Apache Solr -- Apache Oozie -- Apache ZooKeeper -- Apache Flume -- Apache Sqoop -- Cloudera Hue -- Summary -- Part I. Security Architecture -- Chapter 2. Securing Distributed Systems -- Threat Categories -- Unauthorized Access/Masquerade -- Insider Threat -- Denial of Service -- Threats to Data -- Threat and Risk Assessment -- User Assessment -- Environment Assessment -- Vulnerabilities -- Defense in Depth -- Summary -- Chapter 3. System Architecture -- Operating Environment 
505 8 |a Network SecurityNetwork Segmentation -- Network Firewalls -- Intrusion Detection and Prevention -- Hadoop Roles and Separation Strategies -- Master Nodes -- Worker Nodes -- Management Nodes -- Edge Nodes -- Operating System Security -- Remote Access Controls -- Host Firewalls -- SELinux -- Summary -- Chapter 4. Kerberos -- Why Kerberos? -- Kerberos Overview -- Kerberos Workflow: A Simple Example -- Kerberos Trusts -- MIT Kerberos -- Server Configuration -- Client Configuration -- Summary 
505 8 |a Part II. Authentication, Authorization, and AccountingChapter 5. Identity and Authentication -- Identity -- Mapping Kerberos Principals to Usernames -- Hadoop User to Group Mapping -- Provisioning of Hadoop Users -- Authentication -- Kerberos -- Username and Password Authentication -- Tokens -- Impersonation -- Configuration -- Summary -- Chapter 6. Authorization -- HDFS Authorization -- HDFS Extended ACLs -- Service-Level Authorization -- MapReduce and YARN Authorization -- MapReduce (MR1) -- YARN (MR2) -- ZooKeeper ACLs -- Oozie Authorization 
505 8 |a HBase and Accumulo AuthorizationSystem, Namespace, and Table-Level Authorization -- Column- and Cell-Level Authorization -- Summary -- Chapter 7. Apache Sentry (Incubating) -- Sentry Concepts -- The Sentry Service -- Sentry Service Configuration -- Hive Authorization -- Hive Sentry Configuration -- Impala Authorization -- Impala Sentry Configuration -- Solr Authorization -- Solr Sentry Configuration -- Sentry Privilege Models -- SQL Privilege Model -- Solr Privilege Model -- Sentry Policy Administration -- SQL Commands -- SQL Policy File 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Apache Hadoop. 
630 0 7 |a Apache Hadoop.  |2 fast  |0 (OCoLC)fst01911570 
650 0 |a Database security. 
650 0 |a Data encryption (Computer science) 
650 0 |a Data protection. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
700 1 |a Echeverria, Joey,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491900970/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29060403 
994 |a 92  |b IZTAP