Practical Hadoop Security is an excellent resource for administrators planning a production Hadoopdeployment whowant to secure their Hadoop clusters.A detailed guide to thesecurity options and configurationwithin Hadoop itself, author BhushanLakhe takes you through a comprehensive studyof how to implement defined security within a Hadoop cluster in a hands-on way.
You will start witha detailed overview of all the security options available for Hadoop, includingpopular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples)with both in-the-box features and with security extensions implemented by leading vendors.
No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you throughaudit logging and monitoring technologies for Hadoop, as well as ready to useimplementation and configuration examples--again with illustrated code samples.
The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost.
Practical Hadoop Security:
- Explains importance of security, auditing and encryption within a Hadoop installation
- Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
- Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use
|Edition description:||1st ed.|
|Product dimensions:||7.01(w) x 10.00(h) x 0.02(d)|
About the Author
Table of Contents
Chapter 1. Understanding Security Concepts
Chapter 2. Introducing Hadoop
Chapter 3. Introducing Hadoop Security
Chapter 4. Open Source Authentication in Hadoop
Chapter 5. Implementing Granular Authorization
Chapter 6. Hadoop Logs: Relating and Interpretation
Chapter 7. Monitoring in Hadoop
Chapter 8. Encryption in Hadoop