As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.
Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases.
"Sinopsis" puede pertenecer a otra edición de este libro.
Ben is currently a Solutions Architect at Cloudera. During his time with Cloudera, he has worked in a consulting capacity to assist customers with their Hadoop deployments. Ben has worked with many Fortune 500 companies across multiple industries, including financial services, retail, and health care. His primary expertise is the planning, installation, configuration, and securing of customers' Hadoop clusters.In addition to consulting responsibilities, Ben contributes a vast amount of technical writing on customer document deliverables, to include Hadoop best practices, security integration, and cluster administration.Prior to Cloudera, Ben worked for the National Security Agency and with a defense contractor as a software engineer. During this time, Ben built applications that, among other things, integrated with enterprise security infrastructure to protect sensitive information.Ben holds a Bachelor's degree in Computer Science and a Master's degree in Information Technology, with a focus on Information Assurance. Ben's final Master's project was focused on designing an enterprise IT infrastructure with a defense-in-depth approach.Joey is currently Director of Federal Field Technical Services at Cloudera where he oversees the public sector Professional Services and Systems Engineering teams. He was previously a Principal Solutions Architect where he helped customers to design, develop, and deploy production Hadoop applications and clusters. When needed, he has also filled in for Cloudera's support and training teams and has taught Cloudera's administrator and Apache HBase courses.Joey's background is in building and deploying secure data processing applications, with the last 5 years focused on Hadoop-based applications. In the past, he has worked on resource constrained data processing, a clustered implementation of the Snort intrusion detection system, and built a distributed index system on Hadoop when he worked for NSA (where Security was our middle name).
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 6,94 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoEUR 0,96 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
Paperback. Condición: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Nº de ref. del artículo: GOR010321085
Cantidad disponible: 1 disponibles
Librería: WeBuyBooks, Rossendale, LANCS, Reino Unido
Condición: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Nº de ref. del artículo: wbb0024328074
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.01. Nº de ref. del artículo: G1491900989I2N00
Cantidad disponible: 1 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Nº de ref. del artículo: 21739627-5
Cantidad disponible: 3 disponibles
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: WO-9781491900987
Cantidad disponible: 3 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: WO-9781491900987
Cantidad disponible: 3 disponibles
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
Condición: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Nº de ref. del artículo: 21739627-5
Cantidad disponible: 3 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback. Condición: New. New copy - Usually dispatched within 4 working days. 622. Nº de ref. del artículo: B9781491900987
Cantidad disponible: 3 disponibles
Librería: Rarewaves.com UK, London, Reino Unido
Paperback. Condición: New. As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access. Nº de ref. del artículo: LU-9781491900987
Cantidad disponible: 2 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 21739627-n
Cantidad disponible: 3 disponibles