Bienvenue à la Bibliothèque Alo de l'Université Shalom de Bunia
A partir de cette page vous pouvez :
Retourner au premier écran avec les dernières notices... | Votre compte |
Titre : | SELinux by Example: Using Security Enhanced Linux |
Auteurs : | Frank Mayer |
Type de document : | document électronique |
Editeur : | [S.l.] : Prentice Hall, 2006 |
ISBN/ISSN/EAN : | 978-0-13-196369-6 |
Index. décimale : | 005.8 (S├®curit├® des donn├®es. Protection contre le piratage informatique) |
Résumé : |
SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernelÔÇöand delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributionsÔÇöitÔÇÖs easier than ever to take advantage of its benefits. *SELinux by Example *is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policiesÔÇö including the powerful new *Reference Policy*ÔÇöshowing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. ÔÇó Thoroughly understand SELinuxÔÇÖs access control and security mechanisms ÔÇó Use SELinux to construct secure systems from the ground up ÔÇó Gain fine-grained control over kernel resources ÔÇó Write policy statements for type enforcement, roles, users, and constraints ÔÇó Use optional multilevel security to enforce information classification and manage users with diverse clearances ÔÇó Create conditional policies that can be changed on-the-fly ÔÇó Define, manage, and maintain SELinux security policies ÔÇó Develop and write new SELinux security policy modules ÔÇó Leverage emerging SELinux technologies to gain even greater flexibility ÔÇó Effectively administer any SELinux system ### Review "The three authors are well versed in the topic and comprise the best┬áteam to write on SELinux that you could find. Even though it is written as a straightforward text - as opposed to a study guide - I appreciate how each chapter ends with a summary and then exercises to reinforce what you've just finished reading. "--Emmett Dulaney, Editor, UnixReview.com "This is a very good book and is easily the best I've seen yet on the subject of SELinux. If you've been tasked with maintaining an SELinux-enabled machine, would like to write or enhance existing SELinux policy, or just want to understand what SELinux is and how it came to be, then this is the book for you. "--Ryan Maple, Reviewer, LinuxSecurity.com ### From the Back Cover SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernelÔÇöand delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributionsÔÇöitÔÇÖs easier than ever to take advantage of its benefits. *SELinux by Example *is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policiesÔÇö including the powerful new *Reference Policy*ÔÇöshowing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. ÔÇó Thoroughly understand SELinuxÔÇÖs access control and security mechanisms ÔÇó Use SELinux to construct secure systems from the ground up ÔÇó Gain fine-grained control over kernel resources ÔÇó Write policy statements for type enforcement, roles, users, and constraints ÔÇó Use optional multilevel security to enforce information classification and manage users with diverse clearances ÔÇó Create conditional policies that can be changed on-the-fly ÔÇó Define, manage, and maintain SELinux security policies ÔÇó Develop and write new SELinux security policy modules ÔÇó Leverage emerging SELinux technologies to gain even greater flexibility ÔÇó Effectively administer any SELinux system |