SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel-and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distribution
SELinux by Example: Using Security Enhanced Linux
โ Scribed by Frank Mayer, Karl MacMillan, David Caplan
- Publisher
- Prentice Hall
- Year
- 2006
- Tongue
- English
- Leaves
- 339
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel--and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions--it's easier than ever to take advantage of its benefits. SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies-- including the powerful new Reference Policy--showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5./ Thoroughly understand SELinux's access control and security mechanisms / Use SELinux to construct secure systems from the ground up / Gain fine-grained control over kernel resources / Write policy statements for type enforcement, roles, users, and constraints / Use optional multilevel security to enforce information classification and manage users with diverse clearances / Create conditional policies that can be changed on-the-fly / Define, manage, and maintain SELinux security policies / Develop and write new SELinux security policy modules / Leverage emerging SELinux technologies to gain even greater flexibility / Effectively administer any SELinux system
๐ SIMILAR VOLUMES
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the
For Linux courses covering programming where students have had exposure to C programming. Linux Programming By Example covers the basics to allow students to start programming working applications in a Linux environment. It assumes students have some knowledge of C, but no experience in Linux. It c
Linux Socket Programming by Example begins with a very basic introduction to the fundamentals of socket level programming. As the chapters progress, you are introduced to related concepts, such as forming network addresses, Ipv6, the TCP/IP protocol suite and options, writing servers, and creating s
ๅ ๅฎน็ฎไป ยท ยท ยท ยท ยท ยท Linux Programming by Example introduces new Linux programmers to the core Linux programming interfaces in a gradual, consistent fashion, progressing intuitively from the basic to the more complex. It covers I/O, file metainformation, users and groups, processes, basic interprocess