Security Home

Security Articles

Security Links

Security Books

Security Tools

Security Keywords

Security

SELinux

See more Amazon Details

Contents Listing

Preface
1. Introducing SELinux
Software Threats and the Internet
SELinux Features
Applications of SELinux
SELinux History
Web and FTP Sites
2. Overview of the SELinux Security Model
Subjects and Objects
Security Contexts
Transient and Persistent Objects
Access Decisions
Transition Decisions
SELinux Architecture
3. Installing and Initially Configuring SELinux
SELinux Versions
Installing SELinux
Linux Distributions Supporting SELinux
Installation Overview
Installing SELinux from Binary or Source Packages
Installing from Source
4. Using and Administering SELinux
System Modes and SELinux Tuning
Controlling SELinux
Routine SELinux System Use and Administration
Monitoring SELinux
Troubleshooting SELinux
5. SELinux Policy and Policy Language Overview
The SELinux Policy
Two Forms of an SELinux Policy
Anatomy of a Simple SELinux Policy Domain
SELinux Policy Structure
6. Role-Based Access Control
The SELinux Role-Based Access Control Model
Railroad Diagrams
SELinux Policy Syntax
User Declarations
Role-Based Access Control Declarations
7. Type Enforcement
The SELinux Type-Enforcement Model
Review of SELinux Policy Syntax
Type-Enforcement Declarations
Examining a Sample Policy
8. Ancillary Policy Statements
Constraint Declarations
Other Context-Related Declarations
Flask-Related Declarations
9. Customizing SELinux Policies
The SELinux Policy Source Tree
On the Topics of Difficulty and Discretion
Using the SELinux Makefile
Creating an SELinux User
Customizing Roles
Adding Permissions
Allowing a User Access to an Existing Domain
Creating a New Domain
Using Audit2allow
Policy Management Tools
The Road Ahead
A. Security Object Classes
B. SELinux Operations
C. SELinux Macros Defined in src/policy/macros
D. SELinux General Types
E. SELinux Type Attributes
Index

Google
Web www.securitytest.force9.co.uk

Contents
View a contents listing.

Short
Short Description.


Keyword Pages
configuring SELinux
Linux security
operating system security
SELinux
system administrator
systems administration
tuning Linux

Keyword Bestsellers

configuring SELinux

Linux security

operating system security

system administrator

systems administration

tuning Linux

SELinux

Security Bestsellers
The bestselling books on Amazon.

Articles

Microsoft Backtracks onNT4 Support

Real Time Virus Detection for NEC

T-Mobile Hacker in Court

Linux Security Patches Issued

FBI Drops Intelligence Software

Visit our site of the month Load Testing at loadtesting.force9.co.uk
Visit our site of the month Load Testing at loadtesting.force9.co.uk