Security Home
Security Articles
Security Links
Security Books
Security Tools
Security Keywords
|
Security
SELinux
|
|
See more Amazon Details
|
|
Contents Listing
Preface
1. Introducing SELinux
Software Threats and the Internet
SELinux Features
Applications of SELinux
SELinux History
Web and FTP Sites
2. Overview of the SELinux Security Model
Subjects and Objects
Security Contexts
Transient and Persistent Objects
Access Decisions
Transition Decisions
SELinux Architecture
3. Installing and Initially Configuring SELinux
SELinux Versions
Installing SELinux
Linux Distributions Supporting SELinux
Installation Overview
Installing SELinux from Binary or Source Packages
Installing from Source
4. Using and Administering SELinux
System Modes and SELinux Tuning
Controlling SELinux
Routine SELinux System Use and Administration
Monitoring SELinux
Troubleshooting SELinux
5. SELinux Policy and Policy Language Overview
The SELinux Policy
Two Forms of an SELinux Policy
Anatomy of a Simple SELinux Policy Domain
SELinux Policy Structure
6. Role-Based Access Control
The SELinux Role-Based Access Control Model
Railroad Diagrams
SELinux Policy Syntax
User Declarations
Role-Based Access Control Declarations
7. Type Enforcement
The SELinux Type-Enforcement Model
Review of SELinux Policy Syntax
Type-Enforcement Declarations
Examining a Sample Policy
8. Ancillary Policy Statements
Constraint Declarations
Other Context-Related Declarations
Flask-Related Declarations
9. Customizing SELinux Policies
The SELinux Policy Source Tree
On the Topics of Difficulty and Discretion
Using the SELinux Makefile
Creating an SELinux User
Customizing Roles
Adding Permissions
Allowing a User Access to an Existing Domain
Creating a New Domain
Using Audit2allow
Policy Management Tools
The Road Ahead
A. Security Object Classes
B. SELinux Operations
C. SELinux Macros Defined in src/policy/macros
D. SELinux General Types
E. SELinux Type Attributes
Index
|
|
Contents
View a contents listing.
Short
Short Description.
Keyword Pages
configuring SELinux
Linux security
operating system security
SELinux
system administrator
systems administration
tuning Linux
Keyword Bestsellers
configuring SELinux
Linux security
operating system security
system administrator
systems administration
tuning Linux
SELinux
Security Bestsellers The bestselling books on Amazon.
Articles
Microsoft Backtracks onNT4 Support
Real Time Virus Detection for NEC
T-Mobile Hacker in Court
Linux Security Patches Issued
FBI Drops Intelligence Software
Visit our site of the month Load Testing at loadtesting.force9.co.uk
|