Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SELinux by Example: Using Security Enhanced Linux


SELinux: Bring World-Class Security to Any Linux Environment!


SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel–and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions–it’s easier than ever to take advantage
of its benefits.


SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies– including the powerful new Reference Policy–showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.


• Thoroughly understand SELinux’s access control and security mechanisms

• Use SELinux to construct secure systems from the ground up

• Gain fine-grained control over kernel resources

• Write policy statements for type enforcement, roles, users, and constraints

• Use optional multilevel security to enforce information classification and manage users with diverse clearances

• Create conditional policies that can be changed on-the-fly

• Define, manage, and maintain SELinux security policies

• Develop and write new SELinux security policy modules

• Leverage emerging SELinux technologies to gain even greater flexibility

• Effectively administer any SELinux system


About the Author

Frank Mayer is cofounder and Chief Technology Officer of Tresys Technology, and has 23 years of experience in the design, development, and analysis of secure oper­ating systems. He has been an active contributor to SELinux for six years, and has initiated and participated in the development of many new SELinux innovations and tools. He also chairs the annual SELinux Symposium. Frank has published many papers on secure and trustworthy operating systems, and has also explored security in parallel computing, networks, and enterprise applications.

Karl MacMillan is an active contributor in the SELinux community and has led the development of many important SELinux features. He is also a sought after speaker and consultant, and has helped many individuals and organizations under­stand and apply strong computer security with SELinux. Previous to his work on SELinux, Karl made important contributions in the fields of pattern recognition and evolutionary computing as applied to document and audio recognition, where he has numerous published papers.

David Caplan is a senior security engineer at Tresys Technology with over 20 years of experience in computer security and a wide range of other programming- and software-related areas. He has worked with SELinux for six years as a contributor to many of the SELinux-related open source projects and has led multiple efforts in analyzing and constructing SELinux policy for a variety of systems.

(HTML tags aren't allowed.)

R in a Nutshell: A Desktop Quick Reference
R in a Nutshell: A Desktop Quick Reference

What people are saying about R in a Nutshell

"I am excited about this book. R in a Nutshell is a great introduction to R, as well as a comprehensive reference for using R in data analytics and visualization. Adler provides 'real world' examples, practical advice, and scripts, making it...

Sams Teach Yourself Visual C++ 6 in 21 Days, Professional Reference Edition
Sams Teach Yourself Visual C++ 6 in 21 Days, Professional Reference Edition
For the majority of C++ programmers, the pace and style of David Chapman's Teach Yourself Visual C++ 6 in 21 Days will make a good deal of sense. The author covers all the essentials of basic Windows and Microsoft Foundation Classes (MFC) development, and then addresses several new features in Visual C++ 6, all while moving quickly enough...
Data Smart: Using Data Science to Transform Information into Insight
Data Smart: Using Data Science to Transform Information into Insight

Data Science gets thrown around in the press like it's magic. Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.

Mastering Splunk
Mastering Splunk

Optimize your machine-generated data effectively by developing advanced analytics with Splunk

About This Book

  • Develop simple applications into robust, feature-rich applications to search, monitor, and analyze machine-generated big data with ease
  • Learn about lookups, indexing, dashboards,...
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy