Flylib.com
Selinux: NSAs Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
SELinux
Table of Contents
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introducing SELinux
1.1 Software Threats and the Internet
1.2 SELinux Features
1.3 Applications of SELinux
1.4 SELinux History
1.5 Web and FTP Sites
Chapter 2. Overview of the SELinux Security Model
2.1 Subjects and Objects
2.2 Security Contexts
2.3 Transient and Persistent Objects
2.4 Access Decisions
2.5 Transition Decisions
2.6 SELinux Architecture
Chapter 3. Installing and Initially Configuring SELinux
3.1 SELinux Versions
3.2 Installing SELinux
3.3 Linux Distributions Supporting SELinux
3.4 Installation Overview
3.5 Installing SELinux from Binary or Source Packages
3.6 Installing from Source
Chapter 4. Using and Administering SELinux
4.1 System Modes and SELinux Tuning
4.2 Controlling SELinux
4.3 Routine SELinux System Use and Administration
4.4 Monitoring SELinux
4.5 Troubleshooting SELinux
Chapter 5. SELinux Policy and Policy Language Overview
5.1 The SELinux Policy
5.2 Two Forms of an SELinux Policy
5.3 Anatomy of a Simple SELinux Policy Domain
5.4 SELinux Policy Structure
Chapter 6. Role-Based Access Control
6.1 The SELinux Role-Based Access Control Model
6.2 Railroad Diagrams
6.3 SELinux Policy Syntax
6.4 User Declarations
6.5 Role-Based Access Control Declarations
Chapter 7. Type Enforcement
7.1 The SELinux Type-Enforcement Model
7.2 Review of SELinux Policy Syntax
7.3 Type-Enforcement Declarations
7.4 Examining a Sample Policy
Chapter 8. Ancillary Policy Statements
8.1 Constraint Declarations
8.2 Other Context-Related Declarations
8.3 Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
9.1 The SELinux Policy Source Tree
9.2 On the Topics of Difficulty and Discretion
9.3 Using the SELinux Makefile
9.4 Creating an SELinux User
9.5 Customizing Roles
9.6 Adding Permissions
9.7 Allowing a User Access to an Existing Domain
9.8 Creating a New Domain
9.9 Using Audit2allow
9.10 Policy Management Tools
9.11 The Road Ahead
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in srcpolicymacros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.4 How to Generate a Key Using PuTTY
Step 6.1 Port Forwarding
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
Governance Structures for IT in the Health Care Industry
FileMaker Pro 8: The Missing Manual
Same Database, Multiple Windows
Tab Order
Branching and Looping in Scripts
How Security Works
Copying Database Structure
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Enabling SNMP
Autonomous System (AS) Numbers
EIGRP
Congestion Avoidance
A.3. IPv6
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Internet Protocol (IP) Basics
Transmission Control Protocol (TCP) Connections
File and Printer Sharing
Internet Information Services (IIS) and the Internet Protocols
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Development
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix D Employee Development and Succession Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies