舉報

會員
Securing Hadoop
最新章節:
Index
Thisbookisastep-by-steptutorialfilledwithpracticalexampleswhichwillfocusmainlyonthekeysecuritytoolsandimplementationtechniquesofHadoopsecurity.ThisbookisgreatforHadooppractitioners(solutionarchitects,Hadoopadministrators,developers,andHadoopprojectmanagers)whoarelookingtogetagoodgroundinginwhatKerberosisallaboutandwhowishtolearnhowtoimplementend-to-endHadoopsecuritywithinanenterprisesetup.It’sassumedthatyouwillhavesomebasicunderstandingofHadoopaswellasbefamiliarwithsomebasicsecurityconcepts.
目錄(53章)
倒序
- coverpage
- Securing Hadoop
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Hadoop Security Overview
- Why do we need to secure Hadoop?
- Challenges for securing the Hadoop ecosystem
- Key security considerations
- Summary
- Chapter 2. Hadoop Security Design
- What is Kerberos?
- The Hadoop default security model without Kerberos
- Hadoop Kerberos security implementation
- Summary
- Chapter 3. Setting Up a Secured Hadoop Cluster
- Prerequisites
- Setting up Kerberos
- Configuring Hadoop with Kerberos authentication
- Configuring users for Hadoop
- Automation of a secured Hadoop deployment
- Summary
- Chapter 4. Securing the Hadoop Ecosystem
- Configuring Kerberos for Hadoop ecosystem components
- Best practices for securing the Hadoop ecosystem components
- Summary
- Chapter 5. Integrating Hadoop with Enterprise Security Systems
- Integrating Enterprise Identity Management systems
- Accessing a secured Hadoop cluster from an enterprise network
- Summary
- Chapter 6. Securing Sensitive Data in Hadoop
- Securing sensitive data in Hadoop
- Summary
- Chapter 7. Security Event and Audit Logging in Hadoop
- Security Incident and Event Monitoring in a Hadoop Cluster
- Setting up audit logging in a secured Hadoop cluster
- Summary
- Appendix A. Solutions Available for Securing Hadoop
- Hadoop distribution with enhanced security support
- Automation of a secured Hadoop cluster deployment
- Different Hadoop data encryption options
- Securing the Hadoop ecosystem with Project Rhino
- Mapping of security technologies with the reference architecture
- Index 更新時間:2021-11-12 16:38:26
推薦閱讀
- 新中國審計制度變遷
- 自愿審計動機與質量研究:基于我國中期財務報告審計的經驗證據
- EViews10.0的應用與計量分析
- 陜西文物年鑒·2015
- SAP ABAP Advanced Cookbook
- 2016年度注冊會計師全國統一考試專用輔導教材(圖解版):審計
- Tableau:Creating Interactive Data Visualizations
- Big Data Analytics with R and Hadoop
- Implementing VMware Horizon 7.7
- 中國國內生產總值核算問題研究
- 內審人員進階之道:內部審計操作實務與案例解析
- QlikView for Developers Cookbook
- 看穿一切數字的統計學
- Amazon EC2 Cookbook
- 多項目管理方法及其應用研究(國家社科基金后期資助項目)
- 審計學
- 績效考核與薪酬激勵精細化設計必備全書
- 政府審計基本理論探索
- 獨立審計質量的激勵治理模式研究
- Learning Salesforce Visual Workflow and Process Builder(Second Edition)
- 審計學學習指導與習題
- Hadoop Cluster Deployment
- 1小時漫畫統計學:文科生也能看懂的統計學
- Learn Azure Administration
- 審計教學案例精選
- Learning Tableau 2020
- Mastering Redmine(Second Edition)
- VMware vCloud Director Cookbook
- Learning Big Data with Amazon Elastic MapReduce
- Learning Qlikview Data Visualization