Skip to Content
UNIX and Linux System Administration Handbook, 5th Edition
book

UNIX and Linux System Administration Handbook, 5th Edition

by Trent R. Hein, Evi Nemeth, Garth Snyder, Ben Whaley, Dan Mackin
August 2017
Intermediate to advanced
1232 pages
39h 57m
English
Addison-Wesley Professional
Content preview from UNIX and Linux System Administration Handbook, 5th Edition

3

Access Control and Rootly Powers

This chapter is about “access control,” as opposed to “security,” by which we mean that it focuses on the mechanical details of how the kernel and its delegates make security-related decisions. Chapter 27, Security, addresses the more general question of how to set up a system or network to minimize the chance of unwelcome access by intruders.

Access control is an area of active research, and it has long been one of the major challenges of operating system design. Over the last decade, UNIX and Linux have seen a Cambrian explosion of new options in this domain. A primary driver of this surge ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Linux Security and Hardening - Second Edition

Mastering Linux Security and Hardening - Second Edition

Donald A. Tevault
Linux Fundamentals

Linux Fundamentals

Sander van Vugt

Publisher Resources

ISBN: 9780134278308