Securing Hadoop.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 1306155517
- 9781306155519
- 9781783285266
- 1783285265
- 9781783285259
- 1783285257
- Apache Hadoop
- Apache Hadoop
- Electronic data processing -- Distributed processing
- File organization
- Traitement réparti
- COMPUTERS -- Computer Literacy
- COMPUTERS -- Computer Science
- COMPUTERS -- Data Processing
- COMPUTERS -- Hardware -- General
- COMPUTERS -- Information Technology
- COMPUTERS -- Machine Theory
- COMPUTERS -- Reference
- Electronic data processing -- Distributed processing
- 004.36
- QA76.9.F5 .N384 2013
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | E-Books EBSCO | Available |
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop.
Print version record.
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.