Minggu, 07 Februari 2010

[E867.Ebook] Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria As a matter of fact, book is truly a home window to the globe. Also many individuals could not such as reading publications; guides will certainly always give the exact info about reality, fiction, experience, adventure, politic, religion, and more. We are right here an internet site that provides compilations of books more than guide store. Why? We give you lots of numbers of link to get the book Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria On is as you require this Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria You can discover this publication effortlessly right here.

Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria



Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

Some individuals could be giggling when taking a look at you reviewing Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria in your spare time. Some might be admired of you. As well as some could desire be like you which have reading pastime. What about your own feeling? Have you really felt right? Reviewing Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria is a requirement and a pastime at once. This problem is the on that will make you feel that you should read. If you recognize are trying to find the book qualified Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria as the choice of reading, you could find right here.

As one of the home window to open the new world, this Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria provides its outstanding writing from the author. Released in among the popular publishers, this book Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria turneds into one of the most desired books lately. In fact, guide will not matter if that Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria is a best seller or not. Every book will certainly consistently give finest resources to get the user all finest.

However, some people will seek for the best seller publication to check out as the first referral. This is why; this Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria is presented to fulfil your requirement. Some individuals like reading this publication Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria due to this prominent publication, but some love this because of favourite writer. Or, many likewise like reading this book Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria due to the fact that they really should read this book. It can be the one that truly like reading.

In getting this Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria, you might not consistently pass strolling or riding your electric motors to guide establishments. Get the queuing, under the rainfall or very hot light, and still look for the unidentified publication to be during that book establishment. By visiting this web page, you could only search for the Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria and you can locate it. So currently, this time is for you to go for the download link as well as purchase Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria as your personal soft data publication. You can read this book Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria in soft file just and wait as yours. So, you don't have to hurriedly place the book Hadoop Security: Protecting Your Big Data Platform, By Ben Spivey, Joey Echeverria into your bag almost everywhere.

Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.

  • Understand the challenges of securing distributed systems, particularly Hadoop
  • Use best practices for preparing Hadoop cluster hardware as securely as possible
  • Get an overview of the Kerberos network authentication protocol
  • Delve into authorization and accounting principles as they apply to Hadoop
  • Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest
  • Integrate Hadoop data ingest into enterprise-wide security architecture
  • Ensure that security architecture reaches all the way to end-user access

  • Sales Rank: #283567 in eBooks
  • Published on: 2015-06-29
  • Released on: 2015-06-29
  • Format: Kindle eBook

About the Author

Ben is currently a Solutions Architect at Cloudera. During his time with Cloudera, he has worked in a consulting capacity to assist customers with their Hadoop deployments. Ben has worked with many Fortune 500 companies across multiple industries, including financial services, retail, and health care. His primary expertise is the planning, installation, configuration, and securing of customers' Hadoop clusters.

In addition to consulting responsibilities, Ben contributes a vast amount of technical writing on customer document deliverables, to include Hadoop best practices, security integration, and cluster administration.

Prior to Cloudera, Ben worked for the National Security Agency and with a defense contractor as a software engineer. During this time, Ben built applications that, among other things, integrated with enterprise security infrastructure to protect sensitive information.

Ben holds a Bachelor’s degree in Computer Science and a Master’s degree in Information Technology, with a focus on Information Assurance. Ben’s final Master’s project was focused on designing an enterprise IT infrastructure with a defense-in-depth approach.

Joey Echeverria is a Software Engineer at ScalingData where he builds the next generation of IT Operations Analytics on the Apache Hadoop platform. Joey is also a committer on the Kite SDK, an Apache-licensed data API for the Hadoop ecosystem. Joey was previously a Software Engineer at Cloudera where he contributed to a number of ASF projects including Apache Flume, Apache Sqoop, Apache Hadoop, and Apache HBase.

While at Cloudera, Joey also served as the Director of Federal FieldTechnical Services, overseeing the public sector Professional Servicesand Systems Engineering teams. Joey started at Cloudera as a SolutionsArchitect, where he helped customers to design, develop, and deployproduction Hadoop applications and clusters. When needed, he has also filled in for Cloudera’s support and training teams and has taughtCloudera’s administrator and Apache HBase courses.



Joey’s background is in building and deploying secure data processing applications, with the last 7 years focused on Hadoop-based applications. In the past, he has worked on resource constrained data processing, a clustered implementation of the Snort intrusiondetection system, and he built a distributed index system on Hadoopwhen he worked for NSA.

Most helpful customer reviews

2 of 2 people found the following review helpful.
Comprehensive Coverage Of Hadoop Security
By Mairtin O. Sullivan
As a follow up to my basic into to Hadoop with Hadoop 2 Quick Start Guide, I wanted to get more detail on the security features available in the Hadoop ecosystem and this sounded like it fitted the bill and was recently published (June 2015) so figured it would be pretty up to date.

One thing that I immediately liked about the book is that apart from a very brief few pages of an intro to security concepts, it get straight into things, which for me is always a good indication taht there won't be much padding in the book.

The book first starts off with a section on security architecture starting with a basic look threat modelling for distributed systems, which is a nice touch as really threat modelling should be part of any security architecture discussion and even touching on this at a high level is great, as is puts the whole book in context.

The next chapter moves onto general security architectures in a Hadoop environment, covering network level segregation, OS level security and an overview of the different types of Hadoop node roles. This was a great start to the book as immediately it starts working through the different nodes, what user roles need access to them, what nodes can be segregated from direct access and how at a high level they interact for data loads and job submission.

The final chapter of the architecture section finishes up with an overview of Kerberos, which while initially seemed a bit strange, it becomes obvious why later on as Kerberos plays such a key role in Hadoop security. If you need to get up to speed quickly on Kerberos, I’d highly recommend Kerberos: A Network Authentication System… it’s a quick and easy read that I read over ten years ago and it’s still as good now as it was then.

The next section deep dives more into authentication and at this point the book gets straight into the hands on configuration guide, covering detailed configuration steps required to map Kerberos principles into the Hadoop world, how to map to local users, how user groups work in Hadoop and mapping to LDAP groups. The chapter then moves on to cover the various authentication protocols in use across the Hadoop ecosystem, before explaining the differences between simple and Kerberos authn and then a nice dive into token auth, including the flows of how delegation tokens are created to allow various systems to impersonate users. The chapter finishes off with a fully worked Kerberos authn configuration guide, which to be fair I skimmed over as I don’t need that level of detail at the moment.

The next chapter moves onto authz covering HDFS ACLs and extended ACLs and various service level authorisations before moving on to MapReduce (1 and 2) and YARN, and Zookeeper ACLs, HBase, and Oozie. There’s a few nice worked examples here of the effects of authz restrictions and what errors users will see when their access is restricted.

The book then moves on to cover Sentry, which is Apache’s attempt to centralise authz within the Hadoop ecosystem, which after reading through the previous few chapters it’s obvious it’s needed! The basic architecture on which Sentry works is covered and how it integrates with the various applications and then walks though how to configure each application to use Sentry. Again a very practical oriented approach is taken here with a lot of detail on the configuration steps.

The last chapter in this section covers the logging available by default in each of the various applications and their basic config. This is a quick chapter and really just goes to show the configuration aspect, rather than any analysis approaches to the logs.

The third section of the book moves onto data security, specifically to cover encryption of data in transit and at-rest, starting with great coverage of how HDFS file encryption works. What was particularly good in this chapter was the strong emphasis it places on the key management and also making the reader conscious of potential lack of encryption on temporary data such as logs. The second half of the chapter covers encryption of data in transit, mainly focusing on the configuration of SSL/TLS in the various applications in the ecosystem.

The next chapter is a short one and looks at security of data as it is loaded into the Hadoop ecosystem, covering both the confidentiality and integrity of the data, but mainly focusing on confidentiality/encryption. The following chapter then covers how client access of data in the Hadoop environment can be performed securely, focusing of course on the edge nodes and how users interact with them, through command line RPC or APIs. From an architecture perspective, I found this chapter particularly helpful as it does a good job of describing the trust boundary that will exist in most deployments and how this should be architected securely.

The last chapter in this section covers Cloudera Hue and to be honest I just skimmed this one as it wasn’t relevant to me.

The final section of the book covers some use cases nicely, outlining scenarios with business and security requirements, before walking through how to architect and configure the right mix of controls to meet the requirements. For me I would have loved more examples here as this is more at the level I’m working at, rather than the technical configuration. But still, great to see it presented in this way.

Overall, this was a great book that to be fair goes into a lot more depth in terms of technical configuration settings than I needed. This can make it a tough read if you’re just looking for the high level, however, if you’re setting up a Hadoop cluster then this should be your go-to book.

However, it also works great at the level I was looking for as it's got a strong focus on architecture considerations and puts the security functionality into context rather than just explaining the feature sets available. You just may need to skim some of the more detailed sections like I did!

2 of 2 people found the following review helpful.
Big data requires a big security solution. This book shows you how.
By Ben Rothke
As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices.

When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop.

In Hadoop Security: Protecting Your Big Data Platform, authors Ben Spivey and Joey Echeverria have written an invaluable reference for anyone looking to ensure their Hadoop data sets are appropriated secured. This is the type of book that you want your Hadoop administrators to have close by.

Hadoop is one part of an open-source software framework for big data. The authors correctly note that one of the hardest jobs a Hadoop security administrator has is to keep track of how the many components handle security, access control and other authentication functions.

With that, the book does a great job in providing the reader with a thorough overview of the various aspects of the Hadoop security framework. The authors detail how to correctly configure the security features for each of the components. The authors also provide actual code segments for each of the areas.

Anyone using Hadoop should certainly make sure their staff knows about the security controls required to keep their data sets safe. For that, make sure they read Hadoop Security: Protecting Your Big Data Platform.

2 of 3 people found the following review helpful.
Triple J's SDSUG Review 3
By Triple J
"Hadoop Security: Protecting Your Big Data Platform" is an excellent, well-written book which describes the new technology, Apache Hadoop and the numerous security features within Apache Hadoop that can be implemented. This book starts with a basic history of how and why Apache Hadoop was developed and then breaks down how Apache Hadoop can be secured in three (3) sections which are: 1) Security Architecture, 2) Authentication, Authorization & Accounting (AAA) and 3) Data Security. A fourth section entitled Putting It All Together summarizes the first three sections. The best thing about this book is it does a very thorough job of not only explaining the functionality of the very complex Apache Hadoop system and all it's components but also explaining how to configure the built-in security features within these components. Actual code segments that provide more details for enhancing the security for these components makes this book an excellent reference guide for any security professional. I would highly recommend adding this book to your IT Security collection if you are facing the daunting task of securing an Apache Hadoop system.

See all 3 customer reviews...

Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria PDF
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria EPub
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Doc
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria iBooks
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria rtf
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Mobipocket
Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Kindle

[E867.Ebook] Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Doc

[E867.Ebook] Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Doc

[E867.Ebook] Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Doc
[E867.Ebook] Ebook Free Hadoop Security: Protecting Your Big Data Platform, by Ben Spivey, Joey Echeverria Doc

Tidak ada komentar:

Posting Komentar