LEADER 03473nam 22005651 450 001 9910790845503321 005 20200520144314.0 010 $a1-78328-526-5 035 $a(CKB)2550000001165534 035 $a(OCoLC)864382730 035 $a(CaPaEBR)ebrary10810886 035 $a(SSID)ssj0001140034 035 $a(PQKBManifestationID)11726011 035 $a(PQKBTitleCode)TC0001140034 035 $a(PQKBWorkID)11221039 035 $a(PQKB)11499947 035 $a(Au-PeEL)EBL1561454 035 $a(CaPaEBR)ebr10810886 035 $a(CaONFJC)MIL546802 035 $a(CaSebORM)9781783285259 035 $a(MiAaPQ)EBC1561454 035 $a(PPN)228025788 035 $a(EXLCZ)992550000001165534 100 $a20131220d2013 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecuring Hadoop /$fSudheesh Narayanan 205 $a1st edition 210 1$aBirmingham :$cPackt Publishing,$d2013. 215 $a1 online resource (116 p.) 225 1 $aCommunity experience distilled 300 $aIncludes index. 311 $a1-78328-525-7 311 $a1-306-15551-7 330 $aImplement robust end-to-end security for your Hadoop ecosystem Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform Administer the auditing and security event monitoring system In Detail Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure. This book is a practitioner?s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform. 606 $aElectronic data processing$xDistributed processing 606 $aFile organization (Computer science) 615 0$aElectronic data processing$xDistributed processing. 615 0$aFile organization (Computer science) 700 $aNarayanan$b Sudheesh$01522174 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790845503321 996 $aSecuring Hadoop$93761749 997 $aUNINA