官术网_书友最值得收藏!

  • Securing Hadoop
  • Sudheesh Narayanan
  • 319字
  • 2021-11-12 16:38:15

What this book covers

Chapter 1, Hadoop Security Overview, highlights the key challenges and requirements that should be considered for securing any Hadoop-based Big Data platform. We then provide an enterprise view of Big Data security and detail the Big Data security reference architecture.

Chapter 2, Hadoop Security Design, details the internals of the Hadoop security design and explains the key concepts required for understanding and implementing Kerberos security. The focus of this chapter is to arrive at a common understanding of various terminologies and concepts required for remainder of this book.

Chapter 3, Setting Up a Secured Hadoop Cluster, provides a step-by-step guide on configuring Kerberos and establishing a secured Hadoop cluster.

Chapter 4, Securing the Hadoop Ecosystem, looks at the detailed internal interaction and communication protocols for each of the Hadoop ecosystem components along with the security gaps. We then provide a step-by-step guide to establish a secured Big Data ecosystem.

Chapter 5, Integrating Hadoop with Enterprise Security Systems, focuses on the implementation approach to integrate Hadoop security models with enterprise security systems and how to centrally manage access controls for users in a secured Hadoop platform.

Chapter 6, Securing Sensitive Data in Hadoop, provides a detailed implementation approach for securing sensitive data within a Hadoop ecosystem and what are the various data encryption techniques used in securing Big Data platforms.

Chapter 7, Security Event and Audit Logging in Hadoop, provides a deep dive into the security incident and event monitoring system that needs to be implemented in a secured Big Data platform. We then provide the best practices and approach for implementing these security procedures and policies.

Appendix, Solutions Available for Securing Hadoop, provides an overview of the various commercial and open source technologies that are available to build a secured Hadoop Big Data ecosystem. We look into details of each of these technologies and where they fit into the overall Big Data security reference architecture.

主站蜘蛛池模板: 昌都县| 大田县| 大宁县| 绥阳县| 云林县| 米泉市| 城口县| 巴南区| 雅江县| 三台县| 偃师市| 广汉市| 建宁县| 手游| 开远市| 中山市| 怀仁县| 青州市| 屏边| 滕州市| 屯昌县| 色达县| 温宿县| 永善县| 永康市| 鄂托克旗| 德庆县| 西乡县| 武功县| 白城市| 北流市| 民和| 澜沧| 承德县| 眉山市| 绵阳市| 尖扎县| 芮城县| 建宁县| 库伦旗| 渭南市|