Book description
SELinux: Bring World-Class Security to Any Linux Environment!
SELinux offers Linux/UNIX integrators,
administrators, and developers a state-of-the-art platform for
building and maintaining highly secure solutions. Now that SELinux
is included in the Linux 2.6 kernel—and delivered by default
in Fedora Core, Red Hat Enterprise Linux, and other major
distributions—it’s easier than ever to take
advantage
of its benefits.
SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies— including the powerful new Reference Policy—showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.
• Thoroughly understand SELinux’s access control and security mechanisms
• Use SELinux to construct secure systems from the ground up
• Gain fine-grained control over kernel resources
• Write policy statements for type enforcement, roles, users, and constraints
• Use optional multilevel security to enforce information classification and manage users with diverse clearances
• Create conditional policies that can be changed on-the-fly
• Define, manage, and maintain SELinux security policies
• Develop and write new SELinux security policy modules
• Leverage emerging SELinux technologies to gain even greater flexibility
• Effectively administer any SELinux system
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- About the Authors
- Preface
- Part I SELinux Overview
- Part II SELinux Policy Language
- Part III Creating and Writing SELinux Security Policies
- Appendix A Obtaining SELinux Sample Policies
- Appendix B Participation and Further Information
- Appendix C Object Classes and Permissions
- Appendix D SELinux Commands and Utilities
- Index
- Footnote
Product information
- Title: SELinux by Example: Using Security Enhanced Linux
- Author(s):
- Release date: July 2006
- Publisher(s): Pearson
- ISBN: 0131963694
You might also like
video
Mastering Security-Enhanced Linux (SELinux)
5+ Hours of Video Instruction Everything you’ll ever need to know about SELinux! Overview: Mastering Security-Enhanced …
book
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good …
book
SELinux System Administration - Second Edition
Ward off traditional security permissions and effectively secure your Linux systems with SELinux Key Features Leverage …
video
Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, …