Securing Hadoop
Sudheesh Narayanan
Vendido por AHA-BUCH GmbH, Einbeck, Alemania
Vendedor de AbeBooks desde 14 de agosto de 2006
Nuevos - Encuadernación de tapa blanda
Condición: Nuevo
Cantidad disponible: 1 disponibles
Añadir al carritoVendido por AHA-BUCH GmbH, Einbeck, Alemania
Vendedor de AbeBooks desde 14 de agosto de 2006
Condición: Nuevo
Cantidad disponible: 1 disponibles
Añadir al carritonach der Bestellung gedruckt Neuware - Printed after ordering.
N° de ref. del artículo 9781783285259
Implement robust end-to-end security for your Hadoop ecosystem
Overview
In Detail
Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.
This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
What you will learn from this book
Approach
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.
Who this book is written for
This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It’s assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
Implement robust end-to-end security for your Hadoop ecosystem
Overview
In Detail
Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.
This book is a practitioner’s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.
This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
What you will learn from this book
Approach
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.
Who this book is written for
This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It’s assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
"Sobre este título" puede pertenecer a otra edición de este libro.
Ver la página web de la librería
Términos y Condiciones Generales e Información del Cliente / Política de Privacidad
I. Términos y Condiciones Generales
§ 1 Disposiciones básicas
(1)Los siguientes términos y condiciones se aplican a todos los contratos que celebre con nosotros como proveedor (AHA-BUCH GmbH) a través de las plataformas de Internet AbeBooks y/o ZVAB. A menos que se acuerde lo contrario, se objetará la inclusión de cualquiera de sus propios términos y condiciones utilizados por usted.
(2)Un consumidor en el sentid...
Enviamos su pedido después de recibirlos
para artículos disponibles las últimas 24 horas,
para artículos con suministro nocturno a más tardar 48 horas.
En caso de que necesitemos pedir un artículo a nuestro proveedor, nuestro tiempo de envío depende de la fecha de recepción de los artículos, pero los artículos se enviarán el mismo día.
Nuestro objetivo es enviar los artículos pedidos de la manera más rápida, pero también más eficiente y segura a nuestros clientes.
Cantidad del pedido | De 2 a 5 días hábiles | De 2 a 5 días hábiles |
---|---|---|
Primer artículo | EUR 11.99 | EUR 11.99 |
Los plazos de entrega los establecen los vendedores y varían según el transportista y la ubicación. Los pedidos que pasan por la aduana pueden sufrir retrasos y los compradores son responsables de los aranceles o tarifas asociadas. Los vendedores pueden ponerse en contacto con usted en relación con cargos adicionales para cubrir cualquier aumento en los costes de envío de los artículos.