注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)家庭與辦公軟件Hadoop安全(影印版)

Hadoop安全(影印版)

Hadoop安全(影印版)

定 價(jià):¥78.00

作 者: (美)本·斯皮維,喬伊·愛徹利維亞
出版社: 東南大學(xué)出版社
叢編項(xiàng):
標(biāo) 簽: 程序設(shè)計(jì) 計(jì)算機(jī)/網(wǎng)絡(luò)

ISBN: 9787564168711 出版時(shí)間: 2017-01-01 包裝: 平裝-膠訂
開本: 16開 頁數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  隨著越來越多的公司轉(zhuǎn)向用Hadoop來存儲(chǔ)和處理 他們*有價(jià)值的數(shù)據(jù),系統(tǒng)被破壞的潛在風(fēng)險(xiǎn)也正以 指數(shù)級(jí)趨勢(shì)增長(zhǎng)。本·斯皮維、喬伊·愛徹利維亞* 的《Hadoop安全(影印版)(英文版)》這本實(shí)踐圖 書不僅向Hadoop管理員和安全架構(gòu)師們展示了如何保 護(hù)Hadoop數(shù)據(jù),防止未授權(quán)訪問,也介紹了如何限制 攻擊者在安全入侵過程中損壞和篡改數(shù)據(jù)的能力。作者本·斯皮維與喬伊·愛徹利維亞提供了關(guān)于 Hadoop安全特性的深入信息,并將它們根據(jù)通常的計(jì) 算機(jī)安全概念重新組織整理。你還能獲得演示如何將 這些概念應(yīng)用到你自己的用例中的真實(shí)案例。

作者簡(jiǎn)介

暫缺《Hadoop安全(影印版)》作者簡(jiǎn)介

圖書目錄

ForewordPreface1. Introduction Security Overview Confidentiality Integrity Availability Authentication, Authorization, and Accounting Hadoop Security: A Brief History Hadoop Components and Ecosystem Apache HDFS Apache YARN Apache MapReduce Apache Hive Cloudera Impala Apache Sentry (Incubating) Apache HBase Apache Accumulo Apache Solr Apache Oozie Apache ZooKeeper Apache Flume Apache Sqoop Cloudera Hue SummaryPart I. Security Architecture2. Securing Distributed Systems Threat Categories Unauthorized Access/Masquerade Insider Threat Denial of Service Threats to Data Threat and Risk Assessment User Assessment Environment Assessment Vulnerabilities Defense in Depth Summary3. System Architecture Operating Environment Network Security Network Segmentation Network Firewalls Intrusion Detection and Prevention Hadoop Roles and Separation Strategies Master Nodes Worker Nodes Management Nodes Edge Nodes Operating System Security Remote Access Controls Host Firewalls SELinux Summary4. Kerberos Why Kerberos Kerberos Overview Kerberos Workflow: A Simple Example Kerberos Trusts MIT Kerberos Server Configuration Client Configuration SummaryPart II. Authentication, Authorization, and Accounting5. Identity and Authentication Identity Mapping Kerberos Principals to Usernames Hadoop User to Group Mapping Provisioning of Hadoop Users Authentication Kerberos Username and Password Authentication Tokens Impersonation Configuration Summary6. Authorization HDFS Authorization HDFS Extended ACLs Service-Level Authorization MapReduce and YARN Authorization MapReduce (MR1) YARN (MR2) ZooKeeper ACLs Oozie Authorization HBase and Accumulo Authorization System, Namespace, and Table-Level Authorization Column- and Cell-Level Authorization Summary7. Apache Sentry (Incubating) Sentry Concepts The Sentry Service Sentry Service Configuration Hive Authorization Hive Sentry Configuration Impala Authorization Impala Sentry Configuration Solr Authorization Solr Sentry Configuration Sentry Privilege Models SQL Privilege Model Solr Privilege Model Sentry Policy Administration SQL Commands SQL Policy File Solr Policy File Policy File Verification and Validation Migrating From Policy Files Summary8. Accounting HDFS Audit Logs MapReduce Audit Logs YARN Audit Logs Hive Audit Logs Cloudera Impala Audit Logs HBase Audit Logs Accumulo Audit Logs Sentry Audit Logs Log Aggregation SummaryPart III. Data Security9. Data Protection Encryption Algorithms Encrypting Data at Rest Encryption and Key Management HDFS Data-at-Rest Encryption MapReduce2 Intermediate Data Encryption Impala Disk Spill Encryption Full Disk Encryption Filesystem Encryption Important Data Security Consideration for Hadoop Encrypting Data in Transit Transport Layer Security Hadoop Data-in-Transit Encryption Data Destruction and Deletion Summary10. Securing Data Ingest Integrity of Ingested Data Data Ingest Confidentiality Flume Encryption Sqoop Encryption Ingest Workflows Enterprise Architecture Summary11. Data Extraction and Client Access Security. Hadoop Command-Line Interface Securing Applications HBase HBase Shell HBase REST Gateway HBase Thrift Gateway Accumulo Accumulo Shell Accumulo Proxy Server Oozie Sqoop SQL Access Impala Hive WebHDFS/HttpFS Summary12. Cloudera Hue Hue HTTPS Hue Authentication SPNEGO Backend SAML Backend LDAP Backend Hue Authorization Hue SSL Client Configurations SummaryPart IV. Putting It All Together13. Case Studies Case Study: Hadoop Data Warehouse Environment Setup User Experience Summary Case Study: Interactive HBase Web Application Design and Architecture Security Requirements Cluster Configuration Implementation Notes SummaryAfterwordIndex

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)