Flylib.com
Selinux: NSAs Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
SELinux
Table of Contents
Copyright
Preface
Organization of This Book
Conventions Used in This Book
Using Code Examples
How to Contact Us
Acknowledgments
Chapter 1. Introducing SELinux
1.1 Software Threats and the Internet
1.2 SELinux Features
1.3 Applications of SELinux
1.4 SELinux History
1.5 Web and FTP Sites
Chapter 2. Overview of the SELinux Security Model
2.1 Subjects and Objects
2.2 Security Contexts
2.3 Transient and Persistent Objects
2.4 Access Decisions
2.5 Transition Decisions
2.6 SELinux Architecture
Chapter 3. Installing and Initially Configuring SELinux
3.1 SELinux Versions
3.2 Installing SELinux
3.3 Linux Distributions Supporting SELinux
3.4 Installation Overview
3.5 Installing SELinux from Binary or Source Packages
3.6 Installing from Source
Chapter 4. Using and Administering SELinux
4.1 System Modes and SELinux Tuning
4.2 Controlling SELinux
4.3 Routine SELinux System Use and Administration
4.4 Monitoring SELinux
4.5 Troubleshooting SELinux
Chapter 5. SELinux Policy and Policy Language Overview
5.1 The SELinux Policy
5.2 Two Forms of an SELinux Policy
5.3 Anatomy of a Simple SELinux Policy Domain
5.4 SELinux Policy Structure
Chapter 6. Role-Based Access Control
6.1 The SELinux Role-Based Access Control Model
6.2 Railroad Diagrams
6.3 SELinux Policy Syntax
6.4 User Declarations
6.5 Role-Based Access Control Declarations
Chapter 7. Type Enforcement
7.1 The SELinux Type-Enforcement Model
7.2 Review of SELinux Policy Syntax
7.3 Type-Enforcement Declarations
7.4 Examining a Sample Policy
Chapter 8. Ancillary Policy Statements
8.1 Constraint Declarations
8.2 Other Context-Related Declarations
8.3 Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
9.1 The SELinux Policy Source Tree
9.2 On the Topics of Difficulty and Discretion
9.3 Using the SELinux Makefile
9.4 Creating an SELinux User
9.5 Customizing Roles
9.6 Adding Permissions
9.7 Allowing a User Access to an Existing Domain
9.8 Creating a New Domain
9.9 Using Audit2allow
9.10 Policy Management Tools
9.11 The Road Ahead
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in srcpolicymacros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors:
Bill McCarty
BUY ON AMAZON
Similar book on Amazon
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
SELinux by Example: Using Security Enhanced Linux
Hardening Linux
Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)
The CISSP and CAP Prep Guide: Platinum Edition
Qshell for iSeries
Scripting
Parameters and Variables, Defined
Functions
Java Development Tools
C and C++ Development Tools
Snort Cookbook
Sniffing Gigabit Ethernet
Logging to a Unix Socket
Newbies Playing with Snort Using EagleX
Performing Real-Time Data Analysis
Generating Text-Based Log Analysis
101 Microsoft Visual Basic .NET Applications
Data Access
Building Windows Forms User Interfaces
Building Web Applications
Working with Console Applications
Windows Server 2003 for .NET Developers
802.11 Wireless Networks: The Definitive Guide, Second Edition
Scanning
Preauthentication
Power Management and the PCF
Choosing Your Logical Architecture
Security Architecture
Java Concurrency in Practice
What is Thread Safety?
Guarding State with Locks
Designing a Thread-safe Class
Delegating Thread Safety
Implicit Couplings Between Tasks and Execution Policies
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
AToM Pseudowire Operation
Summary
Review Questions
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies