Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SELinux by Example: Using Security Enhanced Linux


SELinux: Bring World-Class Security to Any Linux Environment!


SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel–and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions–it’s easier than ever to take advantage
of its benefits.


SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies– including the powerful new Reference Policy–showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.


• Thoroughly understand SELinux’s access control and security mechanisms

• Use SELinux to construct secure systems from the ground up

• Gain fine-grained control over kernel resources

• Write policy statements for type enforcement, roles, users, and constraints

• Use optional multilevel security to enforce information classification and manage users with diverse clearances

• Create conditional policies that can be changed on-the-fly

• Define, manage, and maintain SELinux security policies

• Develop and write new SELinux security policy modules

• Leverage emerging SELinux technologies to gain even greater flexibility

• Effectively administer any SELinux system


About the Author

Frank Mayer is cofounder and Chief Technology Officer of Tresys Technology, and has 23 years of experience in the design, development, and analysis of secure oper­ating systems. He has been an active contributor to SELinux for six years, and has initiated and participated in the development of many new SELinux innovations and tools. He also chairs the annual SELinux Symposium. Frank has published many papers on secure and trustworthy operating systems, and has also explored security in parallel computing, networks, and enterprise applications.

Karl MacMillan is an active contributor in the SELinux community and has led the development of many important SELinux features. He is also a sought after speaker and consultant, and has helped many individuals and organizations under­stand and apply strong computer security with SELinux. Previous to his work on SELinux, Karl made important contributions in the fields of pattern recognition and evolutionary computing as applied to document and audio recognition, where he has numerous published papers.

David Caplan is a senior security engineer at Tresys Technology with over 20 years of experience in computer security and a wide range of other programming- and software-related areas. He has worked with SELinux for six years as a contributor to many of the SELinux-related open source projects and has led multiple efforts in analyzing and constructing SELinux policy for a variety of systems.

(HTML tags aren't allowed.)

Vagrant Virtual Development Environment Cookbook
Vagrant Virtual Development Environment Cookbook

Over 35 hands-on recipes to help you master Vagrant, and create and manage virtual computational environments

About This Book

  • Configure and deploy software to Vagrant machines with scripts and configuration management tools
  • Manage and share Vagrant development environments with cloud
  • ...
Programming Cameras and Pan-Tilts: with DirectX and Java
Programming Cameras and Pan-Tilts: with DirectX and Java
The rapid rise of PC-based cameras has lead to the enormous growth of software applications that use real-time video programming. These applications include video conferencing, computer games, scientific research, automated security and surveillance, industrial inspection, and Web cameras. Previously, developers had to search through manufacturer...
Diabetes Snacks, Treats and Easy Eats for Kids: 130 Recipes for the Foods Kids Really Like to Eat
Diabetes Snacks, Treats and Easy Eats for Kids: 130 Recipes for the Foods Kids Really Like to Eat
When children come home from school or sports, they want a snack. Not some gourmet meal, just something simple and tasty and quick to fix. For those with diabetes, these snacks can be especially hard to come by. And with incidence rates rising sharply ? one in three American children born in the last five years is expected to become...

Wireless Foresight : Scenarios of the Mobile World in 2015
Wireless Foresight : Scenarios of the Mobile World in 2015

Written for those in the telecom, datacom and infocom industries, this provocative text deals with the development of the wireless communications industry and technology during the coming ten to fifteen years.

Wireless Foresight deals with the development of the wireless communications industry and technology...

50 Fast Photoshop 7 Techniques
50 Fast Photoshop 7 Techniques
This book, with its 50 step-by-step techniques and 50 sets of “before” and “after” images,
has been written to provide you with the knowledge and skills that you need to use
Photoshop 7 to edit your own digital photographs. All the techniques are applicable to
images created with scanners or with digital
Advances in Data Mining and Modeling: Hong Kong 27 - 28 June 2002
Advances in Data Mining and Modeling: Hong Kong 27 - 28 June 2002

Data mining and data modeling are hot topics and are under fast development. Because of its wide applications and rich research contents, a lot of practitioners and academics are attracted to work on these areas. In the view of promoting the communications and collaborations among the practitioners and researchers in Hong Kong, a two-day...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy