Preface
Apache Hadoop is still a relatively young technology, but that has not limited its rapid adoption and the explosion of tools that make up the vast ecosystem around it. This is certainly an exciting time for Hadoop users. While the opportunity to add value to an organization has never been greater, Hadoop still provides a lot of challenges to those responsible for securing access to data and ensuring that systems respect relevant policies and regulations. There exists a wealth of information available to developers building solutions with Hadoop and administrators seeking to deploy and operate it. However, guidance on how to design and implement a secure Hadoop deployment has been lacking.
This book provides in-depth information about the many security features available in Hadoop and organizes it using common computer security concepts. It begins with introductory material in the first chapter, followed by material organized into four larger parts: Part I, Security Architecture; Part II, Authentication, Authorization, and Accounting; Part III, Data Security; and Part IV, PUtting It All Together. These parts cover the early stages of designing a physical and logical security architecture all the way through implementing common security access controls and protecting data. Finally, the book wraps up with use cases that gather many of the concepts covered in the book into real-world examples.
Audience
This book targets Hadoop administrators charged with securing their big ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access