BIBLIOTECA HNO. HILDEBERTO JUAN

Imagen de cubierta local
Imagen de cubierta local

Hadoop security / Ben Spivey & Joey Echeverria.

Por: Colaborador(es): Tipo de material: TextoTextoDetalles de publicación: Sebastopol: O'Reilly Media, 2015.Descripción: 320 páginas, ilustracionesISBN:
  • 9781491900987
Tema(s): Clasificación CDD:
  • 23 005.8 S761h
Contenidos parciales:
Part. I. Security architecture.-- 2. Securing Distributed Sysems.-- 3. System Architecture.-- 4. Kerberos.-- Part. II.Authentication, Authorization, and Accounting.-- 5. Identity and Authentication.-- 6. Authorization.-- 7. Apache Sentry (Incubating).-- 8. Accounting.--Part. III. Data Security.-- 9. Data protection.-- 10. Securing Data Ingest.-- 11. Data Extraction and Client Access Security.-- 12. Cloudera Hue.-- Part IV. Putting It All Together.-- 13. Case Studies.
Resumen: As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Libros Biblioteca Central CIENCIAS PURAS 005.8 S761h (Navegar estantería(Abre debajo)) Ej.1 Disponible B0581

Incluye índice de alfabético

Part. I. Security architecture.-- 2. Securing Distributed Sysems.-- 3. System Architecture.-- 4. Kerberos.-- Part. II.Authentication, Authorization, and Accounting.-- 5. Identity and Authentication.-- 6. Authorization.-- 7. Apache Sentry (Incubating).-- 8. Accounting.--Part. III. Data Security.-- 9. Data protection.-- 10. Securing Data Ingest.-- 11. Data Extraction and Client Access Security.-- 12. Cloudera Hue.-- Part IV. Putting It All Together.-- 13. Case Studies.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

Imagen de cubierta local