Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Books/E-Docs
Author Lakhe, Bhushan, author.

Title Practical Hadoop security / Bhushan Lakhe.

Publication Info. [Place of publication not identified] : Apress, [2014?]
2014

Copies

Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource : color illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
data file rda
Series The expert's voice in security.
Expert's voice in security.
Note Includes index.
Online resource; title from PDF title page (SpringerLink, viewed December 23, 2014).
Summary Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security? encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use.
Contents Machine generated contents note: ch. 1 Understanding Security Concepts -- Introducing Security Engineering -- Security Engineering Framework -- Psychological Aspects of Security Engineering -- Introduction to Security Protocols -- Securing a Program -- Non-Malicious Flaws -- Malicious Flaws -- Securing a Distributed System -- Authentication -- Authorization -- Encryption -- Summary -- ch. 2 Introducing Hadoop -- Hadoop Architecture -- HDFS -- Inherent Security Issues with HDFS Architecture -- Hadoop's Job Framework using MapReduce -- Inherent Security Issues with Hadoop's Job Framework -- Hadoop's Operational Security Woes -- Hadoop Stack -- Main Hadoop Components -- Summary -- ch. 3 Introducing Hadoop Security -- Starting with Hadoop Security -- Introducing Authentication and Authorization for HDFS -- Authorization -- Real-World Example for Designing Hadoop Authorization -- Fine-Grained Authorization for Hadoop -- Securely Administering HDFS -- Using Hadoop Logging for Security -- Monitoring for Security -- Tools of the Trade -- Encryption: Relevance and Implementation for Hadoop -- Encryption for Data in Transit -- Encryption for Data at Rest -- Summary -- ch. 4 Open Source Authentication in Hadoop -- Pieces of the Security Puzzle -- Establishing Secure Client Access -- Countering Spoofing with PuTTY's Host Keys -- Key-Based Authentication Using PuTTY -- Using Passphrases -- Building Secure User Authentication -- Kerberos Overview -- Installing and Configuring Kerberos -- Preparing for Kerberos Implementation -- Implementing Kerberos for Hadoop -- Securing Client-Server Communications -- Safe Inter-process Communication -- Encrypting HTTP Communication -- Securing Data Communication -- Summary -- ch. 5 Implementing Granular Authorization -- Designing User Authorization -- Call the Cops: A Real-World Security Example -- Determine Access Groups and their Access Levels -- Implement the Security Model -- Access Control Lists for HDFS -- Role-Based Authorization with Apache Sentry -- Hive Architecture and Authorization Issues -- Sentry Architecture -- Implementing Roles -- Summary -- ch. 6 Hadoop Logs: Relating and Interpretation -- Using Log4j API -- Loggers -- Appenders -- Layout -- Filters -- Reviewing Hadoop Audit Logs and Daemon Logs -- Audit Logs -- Hadoop Daemon Logs -- Correlating and Interpreting Log Files -- What to Correlate? -- How to Correlate Using Job Name? -- Important Considerations for Logging -- Time Synchronization -- Hadoop Analytics -- Splunk -- Summary -- ch. 7 Monitoring in Hadoop -- Overview of a Monitoring System -- Simple Monitoring System -- Monitoring System for Hadoop -- Hadoop Metrics -- jvm Context -- dfs Context -- rpc Context -- mapred Context -- Metrics and Security -- Metrics Filtering -- Capturing Metrics Output to File -- Security Monitoring with Ganglia and Nagios -- Ganglia -- Monitoring HBase Using Ganglia -- Nagios -- Nagios Integration with Ganglia -- Nagios Community -- Summary -- ch. 8 Encryption in Hadoop -- Introduction to Data Encryption -- Popular Encryption Algorithms -- Applications of Encryption -- Hadoop Encryption Options Overview -- Encryption Using Intel's Hadoop Distro -- Step-by-Step Implementation -- Special Classes Used by Intel Distro -- Using Amazon Web Services to Encrypt Your Data -- Deciding on a Model for Data Encryption and Storage -- Encrypting a Data File Using Selected Model -- Summary -- Appendix A: Pageant Use and Implementation -- Using Pageant -- Security Considerations -- Appendix B: PuTTY and SSH Implementation for Linux-Based Clients -- Using SSH for Remote Access -- Appendix C: Setting Up a KeyStore and TrustStore for HTTP Encryption -- Create HTTPS Certificates and KeyStore/TrustStore Files -- Adjust Permissions for KeyStore/TrustStore Files -- Appendix D: Hadoop Metrics and Their Relevance to Security.
Subject Apache Hadoop.
Apache Hadoop. (OCoLC)fst01911570
Database security.
Data encryption (Computer science)
Data protection.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Security -- General.
Data encryption (Computer science) (OCoLC)fst00887935
Data protection. (OCoLC)fst00887958
Database security. (OCoLC)fst00888063
Genre/Form Electronic books.
Other Form: Printed edition: 9781430265443
ISBN 9781430265450 (electronic bk.)
1430265450 (electronic bk.)
1430265442 (print)
9781430265443 (print)
9781430265443
Standard No. 10.1007/978-1-4302-6545-0 doi
AU@ 000056054313
CHNEW 000890445
CHVBK 374491623
DEBBG BV042490986
DEBBG BV043617617
DEBSZ 434841633
GBVCP 882845063
NLGGC 387106278
NZ1 15914143

 
    
Available items only