Securing Hadoop.:
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) wh...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Packt Publishing,
2013.
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts. |
Beschreibung: | 1 online resource |
ISBN: | 1306155517 9781306155519 9781783285266 1783285265 9781783285259 1783285257 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn864382730 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 131129s2013 xx o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d MHW |d YDXCP |d E7B |d MEAUC |d OCLCQ |d DEBSZ |d CHVBK |d N$T |d OCLCQ |d COO |d OCLCQ |d D6H |d FEM |d JBG |d AGLDB |d MOR |d PIFAG |d ZCU |d MERUC |d OCLCQ |d U3W |d STF |d OCLCF |d VTS |d ICG |d INT |d VT2 |d MFS |d UKMGB |d OCLCQ |d OCLCO |d WYU |d G3B |d TKN |d OCLCQ |d OCLCO |d DKC |d AU@ |d OCLCQ |d M8D |d UKAHL |d OCLCQ |d OCLCO |d QGK |d OCLCQ |d OCLCO |d OCLCL |d UEJ |d OCLCQ |d HOPLA | ||
016 | 7 | |a 018006556 |2 Uk | |
019 | |a 961574805 |a 968039945 |a 969085409 |a 1259231644 | ||
020 | |a 1306155517 |q (electronic bk.) | ||
020 | |a 9781306155519 |q (electronic bk.) | ||
020 | |a 9781783285266 |q (electronic bk.) | ||
020 | |a 1783285265 |q (electronic bk.) | ||
020 | |a 9781783285259 | ||
020 | |a 1783285257 | ||
035 | |a (OCoLC)864382730 |z (OCoLC)961574805 |z (OCoLC)968039945 |z (OCoLC)969085409 |z (OCoLC)1259231644 | ||
037 | |a 546802 |b MIL | ||
050 | 4 | |a QA76.9.F5 .N384 2013 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.36 | |
049 | |a MAIN | ||
100 | 1 | |a Narayanan, Sudheesh. | |
245 | 1 | 0 | |a Securing Hadoop. |
260 | |b Packt Publishing, |c 2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 0 | |a Community experience distilled | |
520 | |a This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts. | ||
505 | 0 | |a Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
630 | 0 | 0 | |a Apache Hadoop. |0 http://id.loc.gov/authorities/names/n2013024279 |
630 | 0 | 7 | |a Apache Hadoop |2 fast |
650 | 0 | |a Electronic data processing |x Distributed processing. |0 http://id.loc.gov/authorities/subjects/sh85042293 | |
650 | 0 | |a File organization. | |
650 | 6 | |a Traitement réparti. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Electronic data processing |x Distributed processing |2 fast | |
758 | |i has work: |a Securing Hadoop (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYVJb7TP6kGGMTRDB8KxtC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781306155519 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a hoopla Digital |b HOPL |n MWT16862937 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26849874 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1561454 | ||
938 | |a ebrary |b EBRY |n ebr10810886 | ||
938 | |a EBSCOhost |b EBSC |n 672985 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26827038 | ||
938 | |a YBP Library Services |b YANK |n 11392299 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn864382730 |
---|---|
_version_ | 1816882251934203907 |
adam_text | |
any_adam_object | |
author | Narayanan, Sudheesh |
author_facet | Narayanan, Sudheesh |
author_role | |
author_sort | Narayanan, Sudheesh |
author_variant | s n sn |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.F5 .N384 2013 |
callnumber-search | QA76.9.F5 .N384 2013 |
callnumber-sort | QA 276.9 F5 N384 42013 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop. |
ctrlnum | (OCoLC)864382730 |
dewey-full | 004.36 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.36 |
dewey-search | 004.36 |
dewey-sort | 14.36 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04193cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn864382730</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">131129s2013 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">MEAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">CHVBK</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">FEM</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">MFS</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HOPLA</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018006556</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961574805</subfield><subfield code="a">968039945</subfield><subfield code="a">969085409</subfield><subfield code="a">1259231644</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306155517</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306155519</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783285266</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783285265</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783285259</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783285257</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864382730</subfield><subfield code="z">(OCoLC)961574805</subfield><subfield code="z">(OCoLC)968039945</subfield><subfield code="z">(OCoLC)969085409</subfield><subfield code="z">(OCoLC)1259231644</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">546802</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.F5 .N384 2013</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.36</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Narayanan, Sudheesh.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Hadoop.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Packt Publishing,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Apache Hadoop.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2013024279</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Apache Hadoop</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042293</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">File organization.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Traitement réparti.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Securing Hadoop (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYVJb7TP6kGGMTRDB8KxtC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781306155519</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT16862937</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26849874</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1561454</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10810886</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">672985</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26827038</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11392299</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn864382730 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:39Z |
institution | BVB |
isbn | 1306155517 9781306155519 9781783285266 1783285265 9781783285259 1783285257 |
language | English |
oclc_num | 864382730 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing, |
record_format | marc |
series2 | Community experience distilled |
spelling | Narayanan, Sudheesh. Securing Hadoop. Packt Publishing, 2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Community experience distilled This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts. Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop. Print version record. English. Apache Hadoop. http://id.loc.gov/authorities/names/n2013024279 Apache Hadoop fast Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 File organization. Traitement réparti. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Electronic data processing Distributed processing fast has work: Securing Hadoop (Text) https://id.oclc.org/worldcat/entity/E39PCYVJb7TP6kGGMTRDB8KxtC https://id.oclc.org/worldcat/ontology/hasWork Print version: 9781306155519 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985 Volltext |
spellingShingle | Narayanan, Sudheesh Securing Hadoop. Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop. Apache Hadoop. http://id.loc.gov/authorities/names/n2013024279 Apache Hadoop fast Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 File organization. Traitement réparti. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Electronic data processing Distributed processing fast |
subject_GND | http://id.loc.gov/authorities/names/n2013024279 http://id.loc.gov/authorities/subjects/sh85042293 |
title | Securing Hadoop. |
title_auth | Securing Hadoop. |
title_exact_search | Securing Hadoop. |
title_full | Securing Hadoop. |
title_fullStr | Securing Hadoop. |
title_full_unstemmed | Securing Hadoop. |
title_short | Securing Hadoop. |
title_sort | securing hadoop |
topic | Apache Hadoop. http://id.loc.gov/authorities/names/n2013024279 Apache Hadoop fast Electronic data processing Distributed processing. http://id.loc.gov/authorities/subjects/sh85042293 File organization. Traitement réparti. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Electronic data processing Distributed processing fast |
topic_facet | Apache Hadoop. Apache Hadoop Electronic data processing Distributed processing. File organization. Traitement réparti. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Electronic data processing Distributed processing |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=672985 |
work_keys_str_mv | AT narayanansudheesh securinghadoop |