Flylib.com
Selinux: NSAs Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
SELinux
Table of Contents
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introducing SELinux
1.1 Software Threats and the Internet
1.2 SELinux Features
1.3 Applications of SELinux
1.4 SELinux History
1.5 Web and FTP Sites
Chapter 2. Overview of the SELinux Security Model
2.1 Subjects and Objects
2.2 Security Contexts
2.3 Transient and Persistent Objects
2.4 Access Decisions
2.5 Transition Decisions
2.6 SELinux Architecture
Chapter 3. Installing and Initially Configuring SELinux
3.1 SELinux Versions
3.2 Installing SELinux
3.3 Linux Distributions Supporting SELinux
3.4 Installation Overview
3.5 Installing SELinux from Binary or Source Packages
3.6 Installing from Source
Chapter 4. Using and Administering SELinux
4.1 System Modes and SELinux Tuning
4.2 Controlling SELinux
4.3 Routine SELinux System Use and Administration
4.4 Monitoring SELinux
4.5 Troubleshooting SELinux
Chapter 5. SELinux Policy and Policy Language Overview
5.1 The SELinux Policy
5.2 Two Forms of an SELinux Policy
5.3 Anatomy of a Simple SELinux Policy Domain
5.4 SELinux Policy Structure
Chapter 6. Role-Based Access Control
6.1 The SELinux Role-Based Access Control Model
6.2 Railroad Diagrams
6.3 SELinux Policy Syntax
6.4 User Declarations
6.5 Role-Based Access Control Declarations
Chapter 7. Type Enforcement
7.1 The SELinux Type-Enforcement Model
7.2 Review of SELinux Policy Syntax
7.3 Type-Enforcement Declarations
7.4 Examining a Sample Policy
Chapter 8. Ancillary Policy Statements
8.1 Constraint Declarations
8.2 Other Context-Related Declarations
8.3 Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
9.1 The SELinux Policy Source Tree
9.2 On the Topics of Difficulty and Discretion
9.3 Using the SELinux Makefile
9.4 Creating an SELinux User
9.5 Customizing Roles
9.6 Adding Permissions
9.7 Allowing a User Access to an Existing Domain
9.8 Creating a New Domain
9.9 Using Audit2allow
9.10 Policy Management Tools
9.11 The Road Ahead
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in srcpolicymacros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
Qshell for iSeries
Using Parameters and Variables
Sed
Application Development Tools
The Perl Utility
C and C++ Development Tools
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Forming Your Kanban Team
Training
Initial Startup and Common Pitfalls
Appendix B Kanban Supermarkets
Appendix C Two-Bin Kanban Systems
WebLogic: The Definitive Guide
JMS
Packaging and Deployment
Structure of a Domain
Programmatic SSL
Miscellaneous Extensions
File System Forensic Analysis
Hard Disk Technology
File System Analysis
What is a File System?
Analysis Tools
Inodes
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Automation Executables
Working with the Worksheets, Charts, and Sheets Collections
Working with the Explorer Object
Conclusion
COM Interop and Regasm.exe
.NET-A Complete Development Cycle
Evaluating .NET for Windows Client Applications
Implementing the SmartNotes Application
Conclusion
Security and Database Access
Wrap-Up
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies