Flylib.com
Selinux: NSAs Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
SELinux
Table of Contents
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introducing SELinux
1.1 Software Threats and the Internet
1.2 SELinux Features
1.3 Applications of SELinux
1.4 SELinux History
1.5 Web and FTP Sites
Chapter 2. Overview of the SELinux Security Model
2.1 Subjects and Objects
2.2 Security Contexts
2.3 Transient and Persistent Objects
2.4 Access Decisions
2.5 Transition Decisions
2.6 SELinux Architecture
Chapter 3. Installing and Initially Configuring SELinux
3.1 SELinux Versions
3.2 Installing SELinux
3.3 Linux Distributions Supporting SELinux
3.4 Installation Overview
3.5 Installing SELinux from Binary or Source Packages
3.6 Installing from Source
Chapter 4. Using and Administering SELinux
4.1 System Modes and SELinux Tuning
4.2 Controlling SELinux
4.3 Routine SELinux System Use and Administration
4.4 Monitoring SELinux
4.5 Troubleshooting SELinux
Chapter 5. SELinux Policy and Policy Language Overview
5.1 The SELinux Policy
5.2 Two Forms of an SELinux Policy
5.3 Anatomy of a Simple SELinux Policy Domain
5.4 SELinux Policy Structure
Chapter 6. Role-Based Access Control
6.1 The SELinux Role-Based Access Control Model
6.2 Railroad Diagrams
6.3 SELinux Policy Syntax
6.4 User Declarations
6.5 Role-Based Access Control Declarations
Chapter 7. Type Enforcement
7.1 The SELinux Type-Enforcement Model
7.2 Review of SELinux Policy Syntax
7.3 Type-Enforcement Declarations
7.4 Examining a Sample Policy
Chapter 8. Ancillary Policy Statements
8.1 Constraint Declarations
8.2 Other Context-Related Declarations
8.3 Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
9.1 The SELinux Policy Source Tree
9.2 On the Topics of Difficulty and Discretion
9.3 Using the SELinux Makefile
9.4 Creating an SELinux User
9.5 Customizing Roles
9.6 Adding Permissions
9.7 Allowing a User Access to an Existing Domain
9.8 Creating a New Domain
9.9 Using Audit2allow
9.10 Policy Management Tools
9.11 The Road Ahead
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in srcpolicymacros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
Java I/O
Subclassing OutputStream
The read( ) Method
JarFile
CharBuffers
File Dialogs and Choosers
Oracle Developer Forms Techniques
The Work-around for PL/SQL 2.x Limitations in Forms 4.5
Encapsulation
Smart Classes and Smart Triggers - How Smart Are They?
Validation, Navigation, and Simulating Navigation
Record Groups and LOVs Based on Objects
Snort Cookbook
Upgrading Snort on Linux
Monitoring Multiple Network Interfaces
Logging in Binary
Detecting Viruses
Integrating Snort with Webmin
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Fashion Logistics and Quick Response
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 90 Introduction
Article 300: Wiring Methods
Article 353 High Density Polyethylene Conduit Type HDPE Conduit
Article 409: Industrial Control Panels
Example No. D1(a) One-Family Dwelling
MPLS Configuration on Cisco IOS Software
CSC Architecture Benefits
VPLS Topology-Single PE or Direct Attachment
Case Study 1: Implementing Multicast Support for MPLS VPNs
Case Study 8: Implementing Hub and Spoke Topologies with EIGRP
Case Study 10: BGP Site of Origin
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies