Securing Hadoop:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Packt Publishing
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations; Setting up secured DataNode; Setting up the TaskController class; Configuring users for Hadoop; Automation of secured Hadoop deployment; Summary; Chapter 4: Securing the Hadoop Ecosystem; Configuring Kerberos for Hadoop ecosystem components; Securing Hive Securing Hive using SentrySecuring Oozie; Securing Flume; Securing Flume sources; Securing Hadoop sink; Securing a Flume channel; Securing HBase; Securing Sqoop; Securing Pig; Best practices for securing the Hadoop ecosystem components; Summary; Chapter 5: Integrating Hadoop with Enterprise Security Systems; Integrating Enterprise Identity Management systems; Configuring EIM integration with Hadoop; Integrating Active Directory-based EIM with the Hadoop ecosystem; Accessing a secured Hadoop cluster from an enterprise network; HttpFS; HUE; Knox Gateway Server; Summary Chapter 6: Securing Sensitive Data in HadoopSecuring sensitive data in Hadoop; Approach for securing insights in Hadoop; Securing data in motion; Securing data at rest; Implementing data encryption in Hadoop; Summary; Chapter 7: Security Event and Audit Logging in Hadoop; Security Incident and Event Monitoring in a Hadoop Cluster; The Security Incident and Event Monitoring (SIEM) system; Setting up audit logging in a secured Hadoop cluster; Configuring Hadoop audit logs; Summary; Appendix: Solutions Available for Securing Hadoop; Hadoop distribution with enhanced security support |
ISBN: | 1306155517 9781306155519 9781783285266 1783285265 9781783285259 1783285257 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043777435 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 1306155517 |9 1-306-15551-7 | ||
020 | |a 9781306155519 |9 978-1-306-15551-9 | ||
020 | |a 9781783285266 |9 978-1-78328-526-6 | ||
020 | |a 1783285265 |9 1-78328-526-5 | ||
020 | |a 9781783285259 |9 978-1-78328-525-9 | ||
020 | |a 1783285257 |9 1-78328-525-7 | ||
035 | |a (ZDB-4-EBA)ocn864382730 | ||
035 | |a (ZDB-4-ITC)ocn864382730 | ||
035 | |a (OCoLC)864382730 | ||
035 | |a (DE-599)BVBBV043777435 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.36 | |
100 | 1 | |a Narayanan, Sudheesh |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing Hadoop |
264 | 1 | |b Packt Publishing |c 2013 | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts | ||
500 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls | ||
500 | |a User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication | ||
500 | |a Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations; Setting up secured DataNode; Setting up the TaskController class; Configuring users for Hadoop; Automation of secured Hadoop deployment; Summary; Chapter 4: Securing the Hadoop Ecosystem; Configuring Kerberos for Hadoop ecosystem components; Securing Hive | ||
500 | |a Securing Hive using SentrySecuring Oozie; Securing Flume; Securing Flume sources; Securing Hadoop sink; Securing a Flume channel; Securing HBase; Securing Sqoop; Securing Pig; Best practices for securing the Hadoop ecosystem components; Summary; Chapter 5: Integrating Hadoop with Enterprise Security Systems; Integrating Enterprise Identity Management systems; Configuring EIM integration with Hadoop; Integrating Active Directory-based EIM with the Hadoop ecosystem; Accessing a secured Hadoop cluster from an enterprise network; HttpFS; HUE; Knox Gateway Server; Summary | ||
500 | |a Chapter 6: Securing Sensitive Data in HadoopSecuring sensitive data in Hadoop; Approach for securing insights in Hadoop; Securing data in motion; Securing data at rest; Implementing data encryption in Hadoop; Summary; Chapter 7: Security Event and Audit Logging in Hadoop; Security Incident and Event Monitoring in a Hadoop Cluster; The Security Incident and Event Monitoring (SIEM) system; Setting up audit logging in a secured Hadoop cluster; Configuring Hadoop audit logs; Summary; Appendix: Solutions Available for Securing Hadoop; Hadoop distribution with enhanced security support | ||
630 | 0 | 4 | |a Apache Hadoop |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Informatik | |
650 | 4 | |a Electronic data processing |x Distributed processing | |
650 | 4 | |a File organization | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029188495 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176604999450624 |
---|---|
any_adam_object | |
author | Narayanan, Sudheesh |
author_facet | Narayanan, Sudheesh |
author_role | aut |
author_sort | Narayanan, Sudheesh |
author_variant | s n sn |
building | Verbundindex |
bvnumber | BV043777435 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn864382730 (ZDB-4-ITC)ocn864382730 (OCoLC)864382730 (DE-599)BVBBV043777435 |
dewey-full | 004.36 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.36 |
dewey-search | 004.36 |
dewey-sort | 14.36 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05481nmm a2200589zc 4500</leader><controlfield tag="001">BV043777435</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306155517</subfield><subfield code="9">1-306-15551-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306155519</subfield><subfield code="9">978-1-306-15551-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783285266</subfield><subfield code="9">978-1-78328-526-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783285265</subfield><subfield code="9">1-78328-526-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783285259</subfield><subfield code="9">978-1-78328-525-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783285257</subfield><subfield code="9">1-78328-525-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn864382730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn864382730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864382730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043777435</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.36</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Narayanan, Sudheesh</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Hadoop</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations; Setting up secured DataNode; Setting up the TaskController class; Configuring users for Hadoop; Automation of secured Hadoop deployment; Summary; Chapter 4: Securing the Hadoop Ecosystem; Configuring Kerberos for Hadoop ecosystem components; Securing Hive</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Securing Hive using SentrySecuring Oozie; Securing Flume; Securing Flume sources; Securing Hadoop sink; Securing a Flume channel; Securing HBase; Securing Sqoop; Securing Pig; Best practices for securing the Hadoop ecosystem components; Summary; Chapter 5: Integrating Hadoop with Enterprise Security Systems; Integrating Enterprise Identity Management systems; Configuring EIM integration with Hadoop; Integrating Active Directory-based EIM with the Hadoop ecosystem; Accessing a secured Hadoop cluster from an enterprise network; HttpFS; HUE; Knox Gateway Server; Summary</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 6: Securing Sensitive Data in HadoopSecuring sensitive data in Hadoop; Approach for securing insights in Hadoop; Securing data in motion; Securing data at rest; Implementing data encryption in Hadoop; Summary; Chapter 7: Security Event and Audit Logging in Hadoop; Security Incident and Event Monitoring in a Hadoop Cluster; The Security Incident and Event Monitoring (SIEM) system; Setting up audit logging in a secured Hadoop cluster; Configuring Hadoop audit logs; Summary; Appendix: Solutions Available for Securing Hadoop; Hadoop distribution with enhanced security support</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Apache Hadoop</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">File organization</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029188495</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043777435 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:50Z |
institution | BVB |
isbn | 1306155517 9781306155519 9781783285266 1783285265 9781783285259 1783285257 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029188495 |
oclc_num | 864382730 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
spelling | Narayanan, Sudheesh Verfasser aut Securing Hadoop Packt Publishing 2013 txt rdacontent c rdamedia cr rdacarrier This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Hadoop Security Overview; Why do we need to secure Hadoop?; Challenges for securing the Hadoop ecosystem; Key security considerations; Reference architecture for Big Data security; Summary; Chapter 2: Hadoop Security Design; What is Kerberos?; Key Kerberos terminologies; How Kerberos works?; Kerberos advantages; The Hadoop default security model with Kerberos; Hadoop Kerberos security implementation; User-level access controls; Service-level access controls User and service authenticationDelegation Token; Job Token; Block Access Token; Summary; Chapter 3: Setting up a Secured Hadoop Cluster; Prerequisites; Setting up Kerberos; Installing the Key Distribution Center; Configuring the Key Distribution Center; Establishing the KDC database; Setting up the administrator principal for KDC; Starting the Kerberos daemons; Setting up the first Kerberos administrator; Adding the user or service principals; Configuring LDAP as the Kerberos database; Supporting AES-256 encryption for a Kerberos ticket; Configuring Hadoop with Kerberos authentication Setting up the Kerberos client on all the Hadoop nodesSetting up the Hadoop service principals; Creating a keytab file for the Hadoop services; Distributing the keytab file for all slaves; Setting up the Hadoop configuration files; HDFS-related configurations; MRV1-related configurations; MRV2-related configurations; Setting up secured DataNode; Setting up the TaskController class; Configuring users for Hadoop; Automation of secured Hadoop deployment; Summary; Chapter 4: Securing the Hadoop Ecosystem; Configuring Kerberos for Hadoop ecosystem components; Securing Hive Securing Hive using SentrySecuring Oozie; Securing Flume; Securing Flume sources; Securing Hadoop sink; Securing a Flume channel; Securing HBase; Securing Sqoop; Securing Pig; Best practices for securing the Hadoop ecosystem components; Summary; Chapter 5: Integrating Hadoop with Enterprise Security Systems; Integrating Enterprise Identity Management systems; Configuring EIM integration with Hadoop; Integrating Active Directory-based EIM with the Hadoop ecosystem; Accessing a secured Hadoop cluster from an enterprise network; HttpFS; HUE; Knox Gateway Server; Summary Chapter 6: Securing Sensitive Data in HadoopSecuring sensitive data in Hadoop; Approach for securing insights in Hadoop; Securing data in motion; Securing data at rest; Implementing data encryption in Hadoop; Summary; Chapter 7: Security Event and Audit Logging in Hadoop; Security Incident and Event Monitoring in a Hadoop Cluster; The Security Incident and Event Monitoring (SIEM) system; Setting up audit logging in a secured Hadoop cluster; Configuring Hadoop audit logs; Summary; Appendix: Solutions Available for Securing Hadoop; Hadoop distribution with enhanced security support Apache Hadoop COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Datenverarbeitung Informatik Electronic data processing Distributed processing File organization |
spellingShingle | Narayanan, Sudheesh Securing Hadoop Apache Hadoop COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Datenverarbeitung Informatik Electronic data processing Distributed processing File organization |
title | Securing Hadoop |
title_auth | Securing Hadoop |
title_exact_search | Securing Hadoop |
title_full | Securing Hadoop |
title_fullStr | Securing Hadoop |
title_full_unstemmed | Securing Hadoop |
title_short | Securing Hadoop |
title_sort | securing hadoop |
topic | Apache Hadoop COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Datenverarbeitung Informatik Electronic data processing Distributed processing File organization |
topic_facet | Apache Hadoop COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Datenverarbeitung Informatik Electronic data processing Distributed processing File organization |
work_keys_str_mv | AT narayanansudheesh securinghadoop |