O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Participation and Further Information

In this chapter

• B.1 The SELinux Mail List

• B.2 The Annual SELinux Symposium

• B.3 The NSA

• B.4 Tresys Technology

• B.5 Open Source Projects

• B.6 The SELinux IRC Channel

• B.7 The Fedora Core Site

• B.8 Hardened Gentoo

• B.9 Other Related Security Information

This appendix identifies where to look for past, current, and future information and discusses how to participate in the development of SELinux and SELinux policies. As with any current technology, SELinux is still evolving, and staying abreast is important.

B.1 The SELinux Mail List

The best place to find out about SELinux development and to ask questions is the SELinux mailing list. To subscribe to the SELinux mailing list, send a message ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required