Practical Hadoop Security (2014)
PART I. Introducing Hadoop and Its Security
CHAPTER 1. Understanding Security Concepts
CHAPTER 3. Introducing Hadoop Security
PART II. Authenticating and Authorizing Within Your Hadoop Cluster
CHAPTER 4. Open Source Authentication in Hadoop
CHAPTER 5. Implementing Granular Authorization
PART III. Audit Logging and Security Monitoring
CHAPTER 6. Hadoop Logs: Relating and Interpretation
CHAPTER 7. Monitoring in Hadoop
PART IV. Encryption for Hadoop
CHAPTER 8. Encryption in Hadoop
PART V. Appendices
APPENDIX A. Pageant Use and Implementation
APPENDIX B. PuTTY and SSH Implementation for Linux-Based Clients
APPENDIX C. Setting Up a KeyStore and TrustStore for HTTP Encryption