Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SELinux by Example: Using Security Enhanced Linux

Buy

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel–and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions–it’s easier than ever to take advantage
of its benefits.

 

SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies– including the powerful new Reference Policy–showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.

 

• Thoroughly understand SELinux’s access control and security mechanisms

• Use SELinux to construct secure systems from the ground up

• Gain fine-grained control over kernel resources

• Write policy statements for type enforcement, roles, users, and constraints

• Use optional multilevel security to enforce information classification and manage users with diverse clearances

• Create conditional policies that can be changed on-the-fly

• Define, manage, and maintain SELinux security policies

• Develop and write new SELinux security policy modules

• Leverage emerging SELinux technologies to gain even greater flexibility

• Effectively administer any SELinux system

 

About the Author

Frank Mayer is cofounder and Chief Technology Officer of Tresys Technology, and has 23 years of experience in the design, development, and analysis of secure oper­ating systems. He has been an active contributor to SELinux for six years, and has initiated and participated in the development of many new SELinux innovations and tools. He also chairs the annual SELinux Symposium. Frank has published many papers on secure and trustworthy operating systems, and has also explored security in parallel computing, networks, and enterprise applications.

Karl MacMillan is an active contributor in the SELinux community and has led the development of many important SELinux features. He is also a sought after speaker and consultant, and has helped many individuals and organizations under­stand and apply strong computer security with SELinux. Previous to his work on SELinux, Karl made important contributions in the fields of pattern recognition and evolutionary computing as applied to document and audio recognition, where he has numerous published papers.

David Caplan is a senior security engineer at Tresys Technology with over 20 years of experience in computer security and a wide range of other programming- and software-related areas. He has worked with SELinux for six years as a contributor to many of the SELinux-related open source projects and has led multiple efforts in analyzing and constructing SELinux policy for a variety of systems.

(HTML tags aren't allowed.)

Walk Like a Giant, Sell Like a Madman
Walk Like a Giant, Sell Like a Madman

As last years best-selling realtor in America, Ralph R. Roberts didn't just outperform his peers, he blew them away. While the average realtor sells seven homes per year, Roberts sold more than 500! Roberts' high-energy, infectious enthusiasm for selling is legendary and has earned him well-deserved national recognition; he has been...

Contemporary Theory of Conservation
Contemporary Theory of Conservation
This essay deals with contemporary theory of conservation.
Perhaps the boldest thesis in the text is the very idea that a contemporary
theory of conservation actually exists. No one doubts
that there are a number of schemes, ideas and opinions – of theories
or fragments of theories that differ to a greater or lesser...
Advances in Cardiac Signal Processing
Advances in Cardiac Signal Processing

This book provides a comprehensive review of progress in the acquisition and extraction of electrocardiogram signals. The coverage is extensive, from a review of filtering techniques to measurement of heart rate variability, to aortic pressure measurement, to strategies for assessing contractile effort of the left ventricle and more. The book...


Beginning Windows 8 Application Development – XAML Edition
Beginning Windows 8 Application Development – XAML Edition

Beginning Windows 8 Application Development – XAML Edition introduces you to the Windows 8 modern app design paradigm and the new Windows 8 programming model developed around this paradigm.  You'll learn to build rich, immersive applications designed to run on the many devices that will be powered by Windows 8.

...
Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing
Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing

This textbook introduces sparse and redundant representations with a focus on applications in signal and image processing. The theoretical and numerical foundations are tackled before the applications are discussed. Mathematical modeling for signal sources is discussed along with how to use the proper model for tasks such as denoising,...

LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)

LR parsing has become a widely used method of syntax analysis; this is largely due to the availability of parser generators and compiler- compilers based on LR techniques. However, the readily available ac counts of the theory of these techniques are either superficial or are weighed down with tedious mathematical detail of a merely...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy