Security
Also available as:
PDF
loading table of contents...

Chapter 3. Configuring Authorization in Hadoop