Hadoop Security
Protecting Your Big Data Platform
Publisher: O'Reilly Media
Final Release Date: June 2015
Pages: 340

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware as securely as possible
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access
Table of Contents
Product Details
About the Author
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyHadoop Security
 
5.0

(based on 2 reviews)

Ratings Distribution

  • 5 Stars

     

    (2)

  • 4 Stars

     

    (0)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 2 customers

Displaying reviews 1-2

Back to top

 
5.0

Best source of information

By Gwen Shapira

from San Jose, CA

About Me Developer, Sys Admin

Pros

  • Accurate
  • Easy to understand
  • Helpful examples
  • Well-written

Cons

    Best Uses

    • Intermediate

    Comments about oreilly Hadoop Security:

    Great information about Hadoop Security - background, general architecture explanations, configuration details and best practices.

    There are no good free online sources with this level of detail, explanations, examples and good advice.

    Highly recommended.

    (2 of 2 customers found this review helpful)

     
    5.0

    Excellent book

    By Chester

    from San Francisco

    About Me Developer, Director Of Engineering

    Verified Buyer

    Pros

    • Easy to understand
    • Helpful examples
    • Well-written

    Cons

      Best Uses

      • Intermediate
      • Student

      Comments about oreilly Hadoop Security:

      I was working on Hadoop Kerberos pass through authentication when I discover this book. This is exactly what I needed: comprehensive and complete information about Kerberos and Hadoop security including detailed configurations. Before this book, I googled a lot and discover different pieces information scatter around apache, cloudera and hortonworks sites, but it does not give you a complete picture as to how these pieces fit together. This book bring this together. Very helpful.

      One important part not covered is how to implement pass through security programmingly. Of course there are only very small audience for this topic as it is advanced topic. But it will help to complete the story.

      Chester Chen

      Displaying reviews 1-2

      Back to top

       
      Buy 2 Get 1 Free Free Shipping Guarantee
      Buying Options
      Immediate Access - Go Digital what's this?
      Ebook:  $42.99
      Formats:  DAISY, ePub, Mobi, PDF
      Print & Ebook:  $54.99
      Print:  $49.99