logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Hadoop Security Protecting Your Big Data Platform 1st Edition Ben Spivey

  • SKU: BELL-5206920
Hadoop Security Protecting Your Big Data Platform 1st Edition Ben Spivey
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Hadoop Security Protecting Your Big Data Platform 1st Edition Ben Spivey instant download after payment.

Publisher: O'Reilly Media
File Extension: PDF
File size: 4.05 MB
Pages: 340
Author: Ben Spivey, Joey Echeverria
ISBN: 9781491900987, 1491900989
Language: English
Year: 2015
Edition: 1

Product desciption

Hadoop Security Protecting Your Big Data Platform 1st Edition Ben Spivey by Ben Spivey, Joey Echeverria 9781491900987, 1491900989 instant download after payment.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware as securely as possible
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access

Related Products