Practical Hadoop Security - Bhushan Lakhe

Practical Hadoop Security (eBook)

(Autor)

eBook Download: PDF
2014 | 1st ed.
XVI, 220 Seiten
Apress (Verlag)
978-1-4302-6545-0 (ISBN)
Systemvoraussetzungen
52,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.

No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples.

The book concludes with the most important aspect of Hadoop security - encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. 

Practical Hadoop Security:

  • Explains importance of security, auditing and encryption within a Hadoop installation
  • Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
  • Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use


Bhushan Lakhe is Senior Vice President of Information and Data Architecture at Ipsos, a global market research company headquartered in Paris. He has more than 25 years experience in software development life cycle management, enterprise architecture design and framework implementation, service management, data warehousing, and Hadoop ecosystem (HDFS, HBase, Hive, Pig, SQOOP, MongoDB) implementation, having worked successively at Tata Consultancy Services, Fujitsu-ICIM, ICL, IBM, Unisys Corporation, and as a database architecture consultant to such clients as Leo Burnett, ABN AMRO Bank, Abbott Laboratories, Motorola, JPMorgan Chase, and British Petroleum. He received IBM’s 2012 Gerstner Award for his implementation of major big data and data warehouse projects. Lakhe is a Cloudera Certified Administrator for Apache Hadoop CDH4 and a Microsoft Certified Technology Specialist, SQL Server Implementation and Maintenance. He is the author of Practical Hadoop Security. He is active in the Chicago Hadoop community and as a speaker at technical meetups and industry conferences. Lakhe graduated from the Birla Institute of Technology and Science, Pilani.
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use

Bhushan Lakhe is Senior Vice President of Information and Data Architecture at Ipsos, a global market research company headquartered in Paris. He has more than 25 years experience in software development life cycle management, enterprise architecture design and framework implementation, service management, data warehousing, and Hadoop ecosystem (HDFS, HBase, Hive, Pig, SQOOP, MongoDB) implementation, having worked successively at Tata Consultancy Services, Fujitsu-ICIM, ICL, IBM, Unisys Corporation, and as a database architecture consultant to such clients as Leo Burnett, ABN AMRO Bank, Abbott Laboratories, Motorola, JPMorgan Chase, and British Petroleum. He received IBM’s 2012 Gerstner Award for his implementation of major big data and data warehouse projects. Lakhe is a Cloudera Certified Administrator for Apache Hadoop CDH4 and a Microsoft Certified Technology Specialist, SQL Server Implementation and Maintenance. He is the author of Practical Hadoop Security. He is active in the Chicago Hadoop community and as a speaker at technical meetups and industry conferences. Lakhe graduated from the Birla Institute of Technology and Science, Pilani.

Chapter 1. Understanding Security ConceptsChapter 2. Introducing HadoopChapter 3. Introducing Hadoop SecurityChapter 4. Open Source Authentication in HadoopChapter 5. Implementing Granular AuthorizationChapter 6. Hadoop Logs: Relating and InterpretationChapter 7. Monitoring in HadoopChapter 8. Encryption in Hadoop

Erscheint lt. Verlag 12.12.2014
Zusatzinfo XVI, 220 p. 88 illus.
Verlagsort Berkeley
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-4302-6545-0 / 1430265450
ISBN-13 978-1-4302-6545-0 / 9781430265450
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90