Hadoop security overview -- Hadoop security design -- Setting up a secured Hadoop cluster -- Securing the Hadoop ecosystem -- Integrating Hadoop with enterprise security systems -- Securing sensitive data in Hadoop -- Security event and audit logging in Hadoop -- Solutions available for securing Hadoop
Summary
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security. This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts