Hadoop Security
Protecting Your Big Data Platform
Publisher: O'Reilly Media
Final Release Date: August 2014
Pages: 250

With Early Release ebooks, you get books in their earliest form—the author's raw and unedited content as he or she writes—so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.



As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book’s material is immediately applicable to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware from a security standpoint
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access
Table of Contents
Product Details
About the Author
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillyHadoop Security
 
5.0

(based on 1 review)

Ratings Distribution

  • 5 Stars

     

    (1)

  • 4 Stars

     

    (0)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 1 customer

Displaying review 1

Back to top

 
5.0

Excellent book

By Chester

from San Francisco

About Me Developer, Director Of Engineering

Verified Buyer

Pros

  • Easy to understand
  • Helpful examples
  • Well-written

Cons

    Best Uses

    • Intermediate
    • Student

    Comments about oreilly Hadoop Security:

    I was working on Hadoop Kerberos pass through authentication when I discover this book. This is exactly what I needed: comprehensive and complete information about Kerberos and Hadoop security including detailed configurations. Before this book, I googled a lot and discover different pieces information scatter around apache, cloudera and hortonworks sites, but it does not give you a complete picture as to how these pieces fit together. This book bring this together. Very helpful.

    One important part not covered is how to implement pass through security programmingly. Of course there are only very small audience for this topic as it is advanced topic. But it will help to complete the story.

    Chester Chen

    Displaying review 1

    Back to top

     
    Buy 2 Get 1 Free Free Shipping Guarantee
    Buying Options
    Immediate Access - Go Digital what's this?
    Pre-Order  Print: $49.99
    April 2015 (est.)