Practical Hadoop Security
Book Details:
Pages: | 220 |
Published: | Dec 09 2014 |
Posted: | Mar 16 2015 |
Language: | English |
Book format: | PDF |
Book size: | 5.33 MB |
Book Description:
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoopdeployment whowant to secure their Hadoop clusters.A detailed guide to thesecurity options and configurationwithin Hadoop itself, author BhushanLakhe takes you through a comprehensive studyof how to implement defined security within a Hadoop cluster in a hands-on way. You will start witha detailed overview of all the security options available for Hadoop, includingpopular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples)with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you throughaudit logging and monitoring technologies for Hadoop, as well as ready to useimplementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use What youll learn Understand your options for implementing Hadoop user security Learn how to configure and set up security for your Hadoop cluster Set upHadoop audit logs, Hadoop metrics, monitoring technologies and related products Configure and set up logging, metrics and monitoring for your Hadoop cluster Discover and implement encryption for data in transit and data at rest and much more. Who this book is for Practical Hadoop Security is an excellent resource for Hadoop administrators who want to secure their environment. IT management planning a production Hadoop environment will also find this text useful. This book is also for students who wish to learn about Hadoop security. Table of ContentsChapter 1. Understanding Security ConceptsChapter 2. Introducing HadoopChapter 3. Introducing Hadoop SecurityChapter 4. Open Source Authentication in HadoopChapter 5. Implementing Granular AuthorizationChapter 6. Hadoop Logs: Relating and InterpretationChapter 7. Monitoring in HadoopChapter 8. Encryption in Hadoop
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive More VoIP ...
Building Secure Resource-Constrained Systems
The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices' inherent resource constraints such as limited power and memory. The...
A Practical Framework for Measuring Security & Protecting Data
Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts to achieve continuous security improvement over time. Real-world examples of security measurement projects are included in this definitive guide. Define security metrics ...
2007 - 2021 © eBooks-IT.org