did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

SELinux by Example Using Security Enhanced Linux

9780131963696

SELinux by Example Using Security Enhanced Linux

  • ISBN 13:

    9780131963696

  • ISBN 10:

    0131963694

  • Edition: 1st
  • Format: Paperback
  • Copyright: 07/27/2006
  • Publisher: Prentice Hall
Sorry, this item is currently unavailable on Knetbooks.com

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kerneland delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributionsitrs"s easier than ever to take advantage of its benefits. SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. AUTHORed by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies including the powerful new Reference Policyshowing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the UPComing Red Hat Enterprise Linux version 5. bull; Thoroughly understand SELinuxrs"s access control and security mechanisms bull; Use SELinux to construct secure systems from the ground up bull; Gain fine-grained control over kernel resources bull; Write policy statements for type enforcement, roles, users, and constraints bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances bull; Create conditional policies that can be changed on-the-fly bull; Define, manage, and maintain SELinux security policies bull; Develop and write new SELinux security policy modules bull; Leverage emerging SELinux technologies to gain even greater flexibility bull; Effectively administer any SELinux system

Author Biography

Read more