LEADER 03506nam 22005771 450 001 9910453708503321 005 20200520144314.0 010 $a1-78328-526-5 035 $a(CKB)2550000001165534 035 $a(OCoLC)864382730 035 $a(CaPaEBR)ebrary10810886 035 $a(SSID)ssj0001140034 035 $a(PQKBManifestationID)11726011 035 $a(PQKBTitleCode)TC0001140034 035 $a(PQKBWorkID)11221039 035 $a(PQKB)11499947 035 $a(MiAaPQ)EBC1561454 035 $a(CaSebORM)9781783285259 035 $a(PPN)228025788 035 $a(Au-PeEL)EBL1561454 035 $a(CaPaEBR)ebr10810886 035 $a(CaONFJC)MIL546802 035 $a(EXLCZ)992550000001165534 100 $a20131220d2013 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecuring Hadoop /$fSudheesh Narayanan 205 $a1st edition 210 1$aBirmingham :$cPackt Publishing,$d2013. 215 $a1 online resource (116 p.) 225 1 $aCommunity experience distilled 300 $aIncludes index. 311 $a1-78328-525-7 311 $a1-306-15551-7 330 $aImplement robust end-to-end security for your Hadoop ecosystem Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform Administer the auditing and security event monitoring system In Detail Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure. This book is a practitioner?s guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform. 606 $aElectronic data processing$xDistributed processing 606 $aFile organization (Computer science) 608 $aElectronic books. 615 0$aElectronic data processing$xDistributed processing. 615 0$aFile organization (Computer science) 700 $aNarayanan$b Sudheesh$0924099 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453708503321 996 $aSecuring Hadoop$92073909 997 $aUNINA LEADER 01191cam a2200265 i 4500 001 991001480139707536 008 060214s2002 it a 001 0 ita d 020 $a887228323X 035 $ab13378922-39ule_inst 040 $aDip.to Beni Culturali $bita 245 10$aMozia :$bgli scavi nella Zona A dell'abitato /$ca cura di Maria Luisa Famà ; testi di Rosario Alaimo [et al.] 260 $aBari :$bEdipuglia,$c2002 300 $a378 p :$bill. ;$c33 cm 440 0$aCollana di archeologia del Centro Internazionale di Studi Fenici, Punici e Romani. Comune di Marsala ;$v1 500 $aIn testa al front.: Centro Internazionale di Studi Fenici, Punici e Romani. Comune di Marsala 650 4$aScavi archeologici$zItalia$zMozia (Città estinta) 700 1 $aFamà, Maria Luisa 700 1 $aAlaimo, Rosario 710 2 $aCentro Internazionale di Studi Fenici, Punici e Romani, Marsala 907 $a.b13378922$b02-04-14$c14-02-06 912 $a991001480139707536 945 $aLE001 AR VII 358 4°$g1$i2001000154807$lle001$op$pE77.50$q-$rl$s- $t0$u0$v0$w0$x0$y.i14193085$z14-02-06 996 $aMozia$986182 997 $aUNISALENTO 998 $ale001$b20-02-06$cm$da $e-$fita$git $h0$i0