clusters. A detailed guide to the security
options and configuration within Hadoop
itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security
within a Hadoop
cluster in a hands-on way.
You will start with a detailed overview of all the security
options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security
(with illustrated code samples) with both in-the-box features and with security
extensions implemented by leading vendors.