000717205 000__ 01494cam\a2200433Ii\4500 000717205 001__ 717205 000717205 005__ 20230306140159.0 000717205 006__ m\\\\\o\\d\\\\\\\\ 000717205 007__ cr\cn\nnnunnun 000717205 008__ 141217s2014\\\\xx\a\\\\o\\\\\001\0\eng\d 000717205 019__ $$a900882981 000717205 020__ $$a9781430265450$$qelectronic book 000717205 020__ $$a1430265450$$qelectronic book 000717205 020__ $$z9781430265443 000717205 035__ $$aSP(OCoLC)ocn898213718 000717205 035__ $$aSP(OCoLC)898213718$$z(OCoLC)900882981 000717205 035__ $$a717205 000717205 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dYDXCP$$dE7B 000717205 049__ $$aISEA 000717205 050_4 $$aQA76.9.D314 000717205 08204 $$a005.8$$223 000717205 1001_ $$aLakhe, Bhushan,$$eauthor. 000717205 24510 $$aPractical Hadoop security$$h[electronic resource] /$$cBhushan Lakhe. 000717205 264_1 $$a[Place of publication not identified] :$$bApress,$$c[2014?] 000717205 300__ $$a1 online resource :$$bcolor illustrations 000717205 336__ $$atext$$btxt$$2rdacontent 000717205 337__ $$acomputer$$bc$$2rdamedia 000717205 338__ $$aonline resource$$bcr$$2rdacarrier 000717205 500__ $$aIncludes index. 000717205 506__ $$aAccess limited to authorized users. 000717205 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 23, 2014). 000717205 63000 $$aApache Hadoop. 000717205 650_0 $$aDatabase security. 000717205 650_0 $$aData encryption (Computer science) 000717205 650_0 $$aData protection. 000717205 85280 $$bebk$$hSpringerLink 000717205 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-1-4302-6545-0$$zOnline Access 000717205 909CO $$ooai:library.usi.edu:717205$$pGLOBAL_SET 000717205 980__ $$aEBOOK 000717205 980__ $$aBIB 000717205 982__ $$aEbook 000717205 983__ $$aOnline 000717205 994__ $$a92$$bISE