舉報

會員
Securing Hadoop
最新章節:
Index
Thisbookisastep-by-steptutorialfilledwithpracticalexampleswhichwillfocusmainlyonthekeysecuritytoolsandimplementationtechniquesofHadoopsecurity.ThisbookisgreatforHadooppractitioners(solutionarchitects,Hadoopadministrators,developers,andHadoopprojectmanagers)whoarelookingtogetagoodgroundinginwhatKerberosisallaboutandwhowishtolearnhowtoimplementend-to-endHadoopsecuritywithinanenterprisesetup.It’sassumedthatyouwillhavesomebasicunderstandingofHadoopaswellasbefamiliarwithsomebasicsecurityconcepts.
目錄(53章)
倒序
- coverpage
- Securing Hadoop
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Hadoop Security Overview
- Why do we need to secure Hadoop?
- Challenges for securing the Hadoop ecosystem
- Key security considerations
- Summary
- Chapter 2. Hadoop Security Design
- What is Kerberos?
- The Hadoop default security model without Kerberos
- Hadoop Kerberos security implementation
- Summary
- Chapter 3. Setting Up a Secured Hadoop Cluster
- Prerequisites
- Setting up Kerberos
- Configuring Hadoop with Kerberos authentication
- Configuring users for Hadoop
- Automation of a secured Hadoop deployment
- Summary
- Chapter 4. Securing the Hadoop Ecosystem
- Configuring Kerberos for Hadoop ecosystem components
- Best practices for securing the Hadoop ecosystem components
- Summary
- Chapter 5. Integrating Hadoop with Enterprise Security Systems
- Integrating Enterprise Identity Management systems
- Accessing a secured Hadoop cluster from an enterprise network
- Summary
- Chapter 6. Securing Sensitive Data in Hadoop
- Securing sensitive data in Hadoop
- Summary
- Chapter 7. Security Event and Audit Logging in Hadoop
- Security Incident and Event Monitoring in a Hadoop Cluster
- Setting up audit logging in a secured Hadoop cluster
- Summary
- Appendix A. Solutions Available for Securing Hadoop
- Hadoop distribution with enhanced security support
- Automation of a secured Hadoop cluster deployment
- Different Hadoop data encryption options
- Securing the Hadoop ecosystem with Project Rhino
- Mapping of security technologies with the reference architecture
- Index 更新時間:2021-11-12 16:38:26
推薦閱讀
- 基于價值增值的治理導向型內部審計研究
- Azure Strategy and Implementation Guide
- 會計信息化基礎(金蝶版)
- 博弈論及其在經濟管理中的應用
- EViews10.0的應用與計量分析
- Metabase Up and Running
- 審計基礎
- AO2011實用手冊
- Programming Microsoft Dynamics NAV(Fifth Edition)
- 陜西國家統計調查市、縣優秀報告集萃(2006—2015)(上下)
- 內審兵法
- Business Intelligence Cookbook:A Project Lifecycle Approach Using Oracle Technology
- 內部審計情景案例:理解審計行為,辨析審計決策
- 統計原理與實務
- 財務會計習題集
- 審計學理論與實務
- 規范內部審計的28個技巧
- Building ERP Solutions with Microsoft Dynamics NAV
- Instant VMware Player for Virtualization
- Microsoft Dynamics AX 2012 R2 Services
- 統計分析與數據解讀
- 計量經濟學模型方法論
- A+H股雙重審計管制取消的經濟后果:基于權益成本和審計質量的研究
- Learning Tableau 2020
- 內部審計與高校治理
- 從報表看舞弊:財務報表分析與風險識別
- Creating Universes with SAP BusinessObjects
- 審計理論與實務(第2版)
- VMware vCloud Director Cookbook
- 內部審計思維與溝通:發現審計問題、克服溝通障礙、實現審計價值