Book Image

Jupyter Cookbook

By : Dan Toomey
Book Image

Jupyter Cookbook

By: Dan Toomey

Overview of this book

Jupyter has garnered a strong interest in the data science community of late, as it makes common data processing and analysis tasks much simpler. This book is for data science professionals who want to master various tasks related to Jupyter to create efficient, easy-to-share, scientific applications. The book starts with recipes on installing and running the Jupyter Notebook system on various platforms and configuring the various packages that can be used with it. You will then see how you can implement different programming languages and frameworks, such as Python, R, Julia, JavaScript, Scala, and Spark on your Jupyter Notebook. This book contains intuitive recipes on building interactive widgets to manipulate and visualize data in real time, sharing your code, creating a multi-user environment, and organizing your notebook. You will then get hands-on experience with Jupyter Labs, microservices, and deploying them on the web. By the end of this book, you will have taken your knowledge of Jupyter to the next level to perform all key tasks associated with it.
Table of Contents (17 chapters)
Title Page
Copyright and Credits
Packt Upsell

Security mechanisms built into Jupyter

Jupyter has a variety of security mechanisms available depending on your needs, which we'll discuss in the following points.

How to do it...

Authentication is the process of proving that the user is as originally presented.

Jupyter can use:

  • Token-based authentication
  • Password authentication
  • No authentication

Current versions of Jupyter use token-based authentication by default. If you enable password protection for your application (the typical username and password that you have seen many times), then token-based authentication is disabled.

Token-based authentication

Token-based authentication is where a token is exchanged for all of a user's requests and it must be present in order for any user request to proceed into your application. For example:

  • User K connects to your application
  • The response from the application has a built-in token that is generated automatically and passed using web headers in the response
  • As the application is running in such a web server...