Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Practical Hadoop Security

Компьютерные >> Программирование





Разместил: bennyblanko

20-01-2015, 08:52

Просмотров: 285





Practical Hadoop Security
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.
You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.


Название: Practical Hadoop Security
Автор: Bhushan Lakhe
Издательство: Apress
ISBN: 978-1-4302-6544-3
Год: 2014
Количество страниц: 220
Формат: PDF
Язык: English
Размер: 5.5 Мб


СКАЧАТЬ


dfiles.ru








Похожие публикации

Fundamentals of Information Systems Security Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in

Corporate Computer Security Corporate Computer Security
A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for

Penetration Testing: A Hands-On Introduction to Hacking Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

Android Hacker's Handbook Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Тесты антивирусов (2013) Тесты антивирусов (2013)
В данном видео подробные тесты следующих антивирусов ArcaVir Internet Security 2012 12.12.3201.1, avast! Internet Security 7.0.1474, AVG Internet Security 2013 13.0.2890, Avira Internet Security 2013 13.0.0.577, F-Secure Internet Security 2013

Чак Лэм  - Hadoop в действии Чак Лэм - Hadoop в действии
Обработка больших массивов данных с помощью традиционных СУБД может оказаться трудным делом. Apache Hadoop - это каркас для разработки приложении, предназначенных для выполнения в распределенном кластере, без применения SQL. Такие приложения

.NET Development Security Solutions .NET Development Security Solutions
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to teach you the right techniques for most scenarios you're

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.

Electronic Postage Systems: Technology, Security, Economics Electronic Postage Systems: Technology, Security, Economics
This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов