SELinux System Administration
Details:
SELinux System Administration by Sven Vermeulen
2013 | ISBN: 1783283173 | English | 120 pages | PDF | 3 MB
A comprehensive guide to walk you through SELinux access controls
Overview
Use SELinux to further control network communications
Enhance your system's security through SELinux access controls
Set up SELinux roles, users and their sensitivity levels
In Detail
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure.
SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book.
This book touches on various SELinux topics, guiding you through the configuration of SELinux contexts, definitions, and the assignment of SELinux roles, and finishes up with policy enhancements. All of SELinux's configuration handles, be they conditional policies, constraints, policy types, or audit capabilities, are covered in this book with genuine examples that administrators might come across.
By the end, SELinux System Administration will have taught you how to configure your Linux system to be more secure, powered by a formidable mandatory access control.
What you will learn from this book
Enable and disable features selectively or even enforce them to a granular level
Interpret SELinux logging to make security-conscious decisions
Assign new contexts and sensitivity labels to files and other resources
Work with mod_selinux to secure web applications
Use tools like sudo, runcon, and newrole to switch roles and run privileged commands in a safe environment
Use iptables to assign labels to network packets
Configure IPSec and NetLabel to transport SELinux contexts over the wire
Build your own SELinux policies using reference policy interfaces
Approach
A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.
Who this book is written for
Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.
PS : If You got an error while extracting while others are working try diferent directory path in your PC. Somtimes if you got a long directory path while extracting it will giv you an error. To solve this issue , as an example just paste the tgz file in C drive and extract (just inside the C drive not with in any other folder). Hope your Understand
Update Torrent Stats to see Current Seeders and Leechers
Visit my account to download more apps and ebooks + magazines
If This Torrent Helpful Please Support the Authors by Purchasing It!.. Thanx
|
udp://open.demonii.com:1337/announce http://torrent.gresille.org/announce http://tracker.secureboxes.net:80/announce udp://9.rarbg.com:2710/announce udp://coppersurfer.tk:6969/announce http://tracker.torrentfrancais.com/announce http://flashtorrents.org/announce.php?passkey=e9f40479a42fdf641916ad24dfd51314 udp://ipv4.tracker.harry.lu:80/announce http://tracker.nwps.ws:6969/announce udp://tracker.token.ro:80/announce udp://10.rarbg.me/announce udp://tracker.publicbt.com:80/announce udp://tracker.istole.it:80/announce udp://tracker.prq.to/announce udp://t1.pow7.com:80/announce |