Understanding security concepts-- Introducing Hadoop -- Introducing Hadoop security -- Open source authentication in Hadoop -- Implementing granular authorization -- Hadoop logs: relating and interpretation -- Monitoring in Hadoop -- Encryption in Hadoop -- Appendix A: pageant use and implementation -- Appendix B: PuTTY and SSH implementation for Linux-based clients -- Appendix C: setting up a KeyStore and TrustStore for HTTP encryption -- Appendix D: Hadoop metrics and their relevance to security