Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
EUR 6,15
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,700grams, ISBN:9781491900987.
EUR 37,96
Anzahl: 3 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Zustand: New. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Num Pages: 340 pages, black & white illustrations. BIC Classification: UN; UR. Category: (P) Professional & Vocational. Dimension: 180 x 232 x 20. Weight in Grams: 596. . 2015. 1st Edition. Paperback. . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 69,80
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 250 pages. 9.00x7.00x1.00 inches. In Stock.
EUR 56,38
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.As mo.
Taschenbuch. Zustand: Neu. Neuware - As more corporations turn to Hadoop to store and process their most valuable data, the risks with a potential breach of those systems increases exponentially. This practical book not only shows security architects how to protect Hadoop data from unauthorized access, but also how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Security is typically the longest phase of any Hadoop project. In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book's material is immediately applicable to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware from a security standpointGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopUse mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access.