Hadoop Security

As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability...
More details
From R730.00 at 1 Shop
Hadoop Security
 0 Reviews

All offers for Hadoop Security

As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book's material is immediately applicable to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware from a security standpointGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopUse mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Write a review

0 User Reviews


All offers for Hadoop Security

Loot.co.za
Facebook

Hadoop Security Paperback

Incorrect offer?

R1 101.00

R730.00

View Offer

Features

Manufacturer

Unbranded

As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book's material is immediately applicable to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware from a security standpointGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopUse mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access
Write a review

0 User Reviews

Do you have any questions about this product?
0 Questions & Answers

Pricing History

As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book's material is immediately applicable to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware from a security standpointGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopUse mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Write a review

0 User Reviews


Do you have any questions about this product?

0 Questions & Answers


Recommended Offers

Advertisement