Hadoop security / Ben Spivey & Joey Echeverria.

Por: Spivey, BenColaborador(es): Echeverria, Joey (Autor)Tipo de material: TextoTextoEditor: Sebastopol: O'Reilly Media, 2015Descripción: 320 páginas, ilustracionesISBN: 9781491900987Tema(s): Arquitectura de seguridad -- Apache Hadoop | Procesamiento electrónico de datos | Seguridad de datosClasificación CDD: 005.8
Contenidos parciales:
Part. I. Security architecture.-- 2. Securing Distributed Sysems.-- 3. System Architecture.-- 4. Kerberos.-- Part. II.Authentication, Authorization, and Accounting.-- 5. Identity and Authentication.-- 6. Authorization.-- 7. Apache Sentry (Incubating).-- 8. Accounting.--Part. III. Data Security.-- 9. Data protection.-- 10. Securing Data Ingest.-- 11. Data Extraction and Client Access Security.-- 12. Cloudera Hue.-- Part IV. Putting It All Together.-- 13. Case Studies.
Resumen: As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
    Valoración media: 0.0 (0 votos)
Tipo de ítem Ubicación actual Signatura Info Vol Estado Notas Fecha de vencimiento Código de barras
Libros Libros Biblioteca Central
CIENCIAS PURAS
005.8 S761h (Navegar estantería) Ej.1 En catalogación Procesos técnicos OK 61931

Incluye índice de alfabético

Part. I. Security architecture.-- 2. Securing Distributed Sysems.-- 3. System Architecture.-- 4. Kerberos.-- Part. II.Authentication, Authorization, and Accounting.-- 5. Identity and Authentication.-- 6. Authorization.-- 7. Apache Sentry (Incubating).-- 8. Accounting.--Part. III. Data Security.-- 9. Data protection.-- 10. Securing Data Ingest.-- 11. Data Extraction and Client Access Security.-- 12. Cloudera Hue.-- Part IV. Putting It All Together.-- 13. Case Studies.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes