40,50 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
* A readable and concrete explanation of SELinux concepts and the SELinux security model
* Installation instructions for numerous distributions
* Basic system and user administration
* A detailed dissection of the SELinux policy language
* Examples and guidelines for altering and adding policies
With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
* A readable and concrete explanation of SELinux concepts and the SELinux security model
* Installation instructions for numerous distributions
* Basic system and user administration
* A detailed dissection of the SELinux policy language
* Examples and guidelines for altering and adding policies
With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
Bill McCarty is a Professor of Information Technology at Azusa Pacific University, Azusa, California. Bill is also the author of over fifteen technical books and numerous papers and presentations. He serves as editor of the Honeynet Files department of the journal IEEE Security and Privacy, and directs the Azusa Pacific University Honeynet Research Project, which is affiliated with the Honeynet Project's Honeynet Research Alliance. Bill has briefed members of US organizations such as the CIA, DISA, FBI, NASA, and NSA, and non-US organizations such as the UK's CESG and GHQ, on his honeynet research. He has worked with the FBI to prevent and detect computer crimes.
Organization of This Book;
Conventions Used in This Book;
Using Code Examples;
How to Contact Us;
Acknowledgments;
Chapter 1: Introducing SELinux;
1.1 Software Threats and the Internet;
1.2 SELinux Features;
1.3 Applications of SELinux;
1.4 SELinux History;
1.5 Web and FTP Sites;
Chapter 2: Overview of the SELinux Security Model;
2.1 Subjects and Objects;
2.2 Security Contexts;
2.3 Transient and Persistent Objects;
2.4 Access Decisions;
2.5 Transition Decisions;
2.6 SELinux Architecture;
Chapter 3: Installing and Initially Configuring SELinux;
3.1 SELinux Versions;
3.2 Installing SELinux;
3.3 Linux Distributions Supporting SELinux;
3.4 Installation Overview;
3.5 Installing SELinux from Binary or Source Packages;
3.6 Installing from Source;
Chapter 4: Using and Administering SELinux;
4.1 System Modes and SELinux Tuning;
4.2 Controlling SELinux;
4.3 Routine SELinux System Use and Administration;
4.4 Monitoring SELinux;
4.5 Troubleshooting SELinux;
Chapter 5: SELinux Policy and Policy Language Overview;
5.1 The SELinux Policy;
5.2 Two Forms of an SELinux Policy;
5.3 Anatomy of a Simple SELinux Policy Domain;
5.4 SELinux Policy Structure;
Chapter 6: Role-Based Access Control;
6.1 The SELinux Role-Based Access Control Model;
6.2 Railroad Diagrams;
6.3 SELinux Policy Syntax;
6.4 User Declarations;
6.5 Role-Based Access Control Declarations;
Chapter 7: Type Enforcement;
7.1 The SELinux Type-Enforcement Model;
7.2 Review of SELinux Policy Syntax;
7.3 Type-Enforcement Declarations;
7.4 Examining a Sample Policy;
Chapter 8: Ancillary Policy Statements;
8.1 Constraint Declarations;
8.2 Other Context-Related Declarations;
8.3 Flask-Related Declarations;
Chapter 9: Customizing SELinux Policies;
9.1 The SELinux Policy Source Tree;
9.2 On the Topics of Difficulty and Discretion;
9.3 Using the SELinux Makefile;
9.4 Creating an SELinux User;
9.5 Customizing Roles;
9.6 Adding Permissions;
9.7 Allowing a User Access to an Existing Domain;
9.8 Creating a New Domain;
9.9 Using Audit2allow;
9.10 Policy Management Tools;
9.11 The Road Ahead;
Security Object Classes;
SELinux Operations;
SELinux Macros Defined in src/policy/macros;
SELinux General Types;
SELinux Type Attributes;
Colophon;
Erscheinungsjahr: | 2004 |
---|---|
Fachbereich: | Betriebssysteme & Benutzeroberflächen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9780596007164 |
ISBN-10: | 0596007167 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Mccarty, Bill |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Maße: | 237 x 180 x 19 mm |
Von/Mit: | Bill Mccarty |
Erscheinungsdatum: | 16.11.2004 |
Gewicht: | 0,431 kg |
Bill McCarty is a Professor of Information Technology at Azusa Pacific University, Azusa, California. Bill is also the author of over fifteen technical books and numerous papers and presentations. He serves as editor of the Honeynet Files department of the journal IEEE Security and Privacy, and directs the Azusa Pacific University Honeynet Research Project, which is affiliated with the Honeynet Project's Honeynet Research Alliance. Bill has briefed members of US organizations such as the CIA, DISA, FBI, NASA, and NSA, and non-US organizations such as the UK's CESG and GHQ, on his honeynet research. He has worked with the FBI to prevent and detect computer crimes.
Organization of This Book;
Conventions Used in This Book;
Using Code Examples;
How to Contact Us;
Acknowledgments;
Chapter 1: Introducing SELinux;
1.1 Software Threats and the Internet;
1.2 SELinux Features;
1.3 Applications of SELinux;
1.4 SELinux History;
1.5 Web and FTP Sites;
Chapter 2: Overview of the SELinux Security Model;
2.1 Subjects and Objects;
2.2 Security Contexts;
2.3 Transient and Persistent Objects;
2.4 Access Decisions;
2.5 Transition Decisions;
2.6 SELinux Architecture;
Chapter 3: Installing and Initially Configuring SELinux;
3.1 SELinux Versions;
3.2 Installing SELinux;
3.3 Linux Distributions Supporting SELinux;
3.4 Installation Overview;
3.5 Installing SELinux from Binary or Source Packages;
3.6 Installing from Source;
Chapter 4: Using and Administering SELinux;
4.1 System Modes and SELinux Tuning;
4.2 Controlling SELinux;
4.3 Routine SELinux System Use and Administration;
4.4 Monitoring SELinux;
4.5 Troubleshooting SELinux;
Chapter 5: SELinux Policy and Policy Language Overview;
5.1 The SELinux Policy;
5.2 Two Forms of an SELinux Policy;
5.3 Anatomy of a Simple SELinux Policy Domain;
5.4 SELinux Policy Structure;
Chapter 6: Role-Based Access Control;
6.1 The SELinux Role-Based Access Control Model;
6.2 Railroad Diagrams;
6.3 SELinux Policy Syntax;
6.4 User Declarations;
6.5 Role-Based Access Control Declarations;
Chapter 7: Type Enforcement;
7.1 The SELinux Type-Enforcement Model;
7.2 Review of SELinux Policy Syntax;
7.3 Type-Enforcement Declarations;
7.4 Examining a Sample Policy;
Chapter 8: Ancillary Policy Statements;
8.1 Constraint Declarations;
8.2 Other Context-Related Declarations;
8.3 Flask-Related Declarations;
Chapter 9: Customizing SELinux Policies;
9.1 The SELinux Policy Source Tree;
9.2 On the Topics of Difficulty and Discretion;
9.3 Using the SELinux Makefile;
9.4 Creating an SELinux User;
9.5 Customizing Roles;
9.6 Adding Permissions;
9.7 Allowing a User Access to an Existing Domain;
9.8 Creating a New Domain;
9.9 Using Audit2allow;
9.10 Policy Management Tools;
9.11 The Road Ahead;
Security Object Classes;
SELinux Operations;
SELinux Macros Defined in src/policy/macros;
SELinux General Types;
SELinux Type Attributes;
Colophon;
Erscheinungsjahr: | 2004 |
---|---|
Fachbereich: | Betriebssysteme & Benutzeroberflächen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9780596007164 |
ISBN-10: | 0596007167 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Mccarty, Bill |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Maße: | 237 x 180 x 19 mm |
Von/Mit: | Bill Mccarty |
Erscheinungsdatum: | 16.11.2004 |
Gewicht: | 0,431 kg |