[go: up one dir, main page]

Lakhe, 2014 - Google Patents

Practical Hadoop Security

Lakhe, 2014

Document ID
10298151662819139863
Author
Lakhe B
Publication year

External Links

Snippet

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Saleem et al. Sok: Anatomy of data breaches
CN111164948B (en) Managing network security vulnerabilities using blockchain networks
Ramachandran et al. Towards performance evaluation of cloud service providers for cloud data security
Bhathal et al. Big Data: Hadoop framework vulnerabilities, security issues and attacks
Natan Implementing database security and auditing
Dotson Practical cloud security
Gul et al. Cloud computing security auditing
Siriwardena Advanced API security: OAuth 2.0 and beyond
Bulusu et al. A study on cloud computing security challenges
Shimonski et al. Security Strategies in Windows Platforms and Applications
Kajiyama Cloud computing security: how risks and threats are affecting cloud adoption decisions
Lakhe Practical Hadoop Security
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Aich Secure query processing by blocking sql injection
Dhondge Lifecycle IoT Security for Engineers
Yadav et al. A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security
Ramirez A framework to build secure microservice architecture
Ottenheimer et al. Securing the Virtual Environment: How to Defend the Enterprise Against Attack
Karlzén An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis
Reece Multi-cloud identity security utilizing Self-Sovereign Identity
Shaul et al. Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Wright Protecting Oracle Database 12c
Salim et al. A Literature Review of Challenges and Solutions in Cloud Security
Alqahtani A novel approach to providing secure data storage using multi cloud computing