More Related Content Similar to Analyzing Pwned Passwords with Spark and Scala (20) More from Kelley Robinson (20) Analyzing Pwned Passwords with Spark and Scala5. BIG DATA & SECURITY @KELLEYROBINSON
Spark: then and now
The state of passwords
Spark in action
Big Data ∩ Security
8. BIG DATA & SECURITY @KELLEYROBINSON
Apache Spark Ecosystem
9. BIG DATA & SECURITY @KELLEYROBINSON
Spark Abstractions
Then
Now
RDD (Resilient Distributed Dataset)
DataFrames / Datasets
12. BIG DATA & SECURITY
https://databricks.gitbooks.io/databricks-spark-knowledge-base/content/best_practices/prefer_reducebykey_over_groupbykey.html
@KELLEYROBINSON
15. BIG DATA & SECURITY @KELLEYROBINSON
Apache Spark Ecosystem
16. BIG DATA & SECURITY @KELLEYROBINSON
Scala has the most
robust language API
17. BIG DATA & SECURITY
https://www.slideshare.net/databricks/composable-parallel-processing-in-apache-spark-and-weld
@KELLEYROBINSON
18. BIG DATA & SECURITY @KELLEYROBINSON
Spark: then and now
The state of passwords
Spark in action
Big Data ∩ Security
27. BIG DATA & SECURITY
https://jaceklaskowski.gitbooks.io/mastering-apache-spark/content/
@KELLEYROBINSON
👍💯
The missing Spark documentation
28. BIG DATA & SECURITY @KELLEYROBINSON
Spark: then and now
The state of passwords
Spark in action
Big Data ∩ Security
34. Spark Resources
• Apache Spark
• Jacek's Spark Documentation
• Zeppelin
• RDDs vs. Datasets
• Running Spark on a Cluster
Security Resources
• Pwned Passwords
• Reverse SHA1 hashes
• LastPass and 1Password
• 2FA Guides
@KELLEYROBINSONBIG DATA & SECURITY