SELinux by example: using security enhanced Linux
SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by de...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Upper Saddle River, N.J.
Prentice Hall
2006
|
Series: | Prentice Hall open source software development series
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/0131963694/?ar |
Summary: | SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions & mdash;it & rsquo;s easier than ever to take advantage of its benefits. € SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies & mdash; including the powerful new Reference Policy & mdash;showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. € & bull; Thoroughly understand SELinux & rsquo;s access control and security mechanisms & bull; Use SELinux to construct secure systems from the ground up & bull; Gain fine-grained control over kernel resources & bull; Write policy statements for type enforcement, roles, users, and constraints & bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances & bull; Create conditional policies that can be changed on-the-fly & bull; Define, manage, and maintain SELinux security policies & bull; Develop and write new SELinux security policy modules & bull; Leverage emerging SELinux technologies to gain even greater flexibility & bull; Effectively administer any SELinux system. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource |
ISBN: | 0131963694 9780131963696 9780132055130 0132055139 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047355808 | ||
003 | DE-627-1 | ||
005 | 20240228114106.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2006 xx |||||o 00| ||eng c | ||
020 | |a 0131963694 |9 0-13-196369-4 | ||
020 | |a 9780131963696 |9 978-0-13-196369-6 | ||
020 | |a 9780132055130 |9 978-0-13-205513-0 | ||
020 | |a 0132055139 |9 0-13-205513-9 | ||
035 | |a (DE-627-1)047355808 | ||
035 | |a (DE-599)KEP047355808 | ||
035 | |a (ORHE)0131963694 | ||
035 | |a (DE-627-1)047355808 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Mayer, Frank |d 1961- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a SELinux by example |b using security enhanced Linux |c Frank Mayer, Karl MacMillan, David Caplan |
264 | 1 | |a Upper Saddle River, N.J. |b Prentice Hall |c 2006 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Prentice Hall open source software development series | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions & mdash;it & rsquo;s easier than ever to take advantage of its benefits. € SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies & mdash; including the powerful new Reference Policy & mdash;showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. € & bull; Thoroughly understand SELinux & rsquo;s access control and security mechanisms & bull; Use SELinux to construct secure systems from the ground up & bull; Gain fine-grained control over kernel resources & bull; Write policy statements for type enforcement, roles, users, and constraints & bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances & bull; Create conditional policies that can be changed on-the-fly & bull; Define, manage, and maintain SELinux security policies & bull; Develop and write new SELinux security policy modules & bull; Leverage emerging SELinux technologies to gain even greater flexibility & bull; Effectively administer any SELinux system. | ||
630 | 2 | 0 | |a Linux |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Linux | |
650 | 4 | |a Linux | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a operating systems | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a MacMillan, Karl |d 1975- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Caplan, David |d 1963- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0131963694 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0131963694 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0131963694/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047355808 |
---|---|
_version_ | 1829007824141680640 |
adam_text | |
any_adam_object | |
author | Mayer, Frank 1961- |
author2 | MacMillan, Karl 1975- Caplan, David 1963- |
author2_role | ctb ctb |
author2_variant | k m km d c dc |
author_facet | Mayer, Frank 1961- MacMillan, Karl 1975- Caplan, David 1963- |
author_role | aut |
author_sort | Mayer, Frank 1961- |
author_variant | f m fm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047355808 (DE-599)KEP047355808 (ORHE)0131963694 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03888cam a22005772c 4500</leader><controlfield tag="001">ZDB-30-ORH-047355808</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114106.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2006 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131963694</subfield><subfield code="9">0-13-196369-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780131963696</subfield><subfield code="9">978-0-13-196369-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780132055130</subfield><subfield code="9">978-0-13-205513-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132055139</subfield><subfield code="9">0-13-205513-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047355808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047355808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0131963694</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047355808</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mayer, Frank</subfield><subfield code="d">1961-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SELinux by example</subfield><subfield code="b">using security enhanced Linux</subfield><subfield code="c">Frank Mayer, Karl MacMillan, David Caplan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Prentice Hall open source software development series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions & mdash;it & rsquo;s easier than ever to take advantage of its benefits. € SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies & mdash; including the powerful new Reference Policy & mdash;showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. € & bull; Thoroughly understand SELinux & rsquo;s access control and security mechanisms & bull; Use SELinux to construct secure systems from the ground up & bull; Gain fine-grained control over kernel resources & bull; Write policy statements for type enforcement, roles, users, and constraints & bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances & bull; Create conditional policies that can be changed on-the-fly & bull; Define, manage, and maintain SELinux security policies & bull; Develop and write new SELinux security policy modules & bull; Leverage emerging SELinux technologies to gain even greater flexibility & bull; Effectively administer any SELinux system.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">MacMillan, Karl</subfield><subfield code="d">1975-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Caplan, David</subfield><subfield code="d">1963-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0131963694</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0131963694</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0131963694/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047355808 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:26Z |
institution | BVB |
isbn | 0131963694 9780131963696 9780132055130 0132055139 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Prentice Hall |
record_format | marc |
series2 | Prentice Hall open source software development series |
spelling | Mayer, Frank 1961- VerfasserIn aut SELinux by example using security enhanced Linux Frank Mayer, Karl MacMillan, David Caplan Upper Saddle River, N.J. Prentice Hall 2006 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Prentice Hall open source software development series Includes bibliographical references and index. - Print version record SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions & mdash;it & rsquo;s easier than ever to take advantage of its benefits. € SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies & mdash; including the powerful new Reference Policy & mdash;showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. € & bull; Thoroughly understand SELinux & rsquo;s access control and security mechanisms & bull; Use SELinux to construct secure systems from the ground up & bull; Gain fine-grained control over kernel resources & bull; Write policy statements for type enforcement, roles, users, and constraints & bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances & bull; Create conditional policies that can be changed on-the-fly & bull; Define, manage, and maintain SELinux security policies & bull; Develop and write new SELinux security policy modules & bull; Leverage emerging SELinux technologies to gain even greater flexibility & bull; Effectively administer any SELinux system. Linux Operating systems (Computers) Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures MacMillan, Karl 1975- MitwirkendeR ctb Caplan, David 1963- MitwirkendeR ctb 0131963694 Erscheint auch als Druck-Ausgabe 0131963694 |
spellingShingle | Mayer, Frank 1961- SELinux by example using security enhanced Linux Linux Operating systems (Computers) Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures |
title | SELinux by example using security enhanced Linux |
title_auth | SELinux by example using security enhanced Linux |
title_exact_search | SELinux by example using security enhanced Linux |
title_full | SELinux by example using security enhanced Linux Frank Mayer, Karl MacMillan, David Caplan |
title_fullStr | SELinux by example using security enhanced Linux Frank Mayer, Karl MacMillan, David Caplan |
title_full_unstemmed | SELinux by example using security enhanced Linux Frank Mayer, Karl MacMillan, David Caplan |
title_short | SELinux by example |
title_sort | selinux by example using security enhanced linux |
title_sub | using security enhanced Linux |
topic | Linux Operating systems (Computers) Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures |
topic_facet | Linux Operating systems (Computers) Computer networks Security measures Systèmes d'exploitation (Ordinateurs) Réseaux d'ordinateurs ; Sécurité ; Mesures operating systems Computer networks ; Security measures |
work_keys_str_mv | AT mayerfrank selinuxbyexampleusingsecurityenhancedlinux AT macmillankarl selinuxbyexampleusingsecurityenhancedlinux AT caplandavid selinuxbyexampleusingsecurityenhancedlinux |