SELinux by Example: Using Security Enhanced Linux. David Caplan, Frank Mayer, Karl MacMillan

SELinux by Example: Using Security Enhanced Linux


SELinux.by.Example.Using.Security.Enhanced.Linux.pdf
ISBN: 0131963694,9780131963696 | 339 pages | 9 Mb


Download SELinux by Example: Using Security Enhanced Linux



SELinux by Example: Using Security Enhanced Linux David Caplan, Frank Mayer, Karl MacMillan
Publisher: Prentice Hall




* customize the ports services listen on. SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux, a high-security computer is within reach of any system administrator. My employer, Red Hat, is allowing me to work on another Security-Enhanced Linux (SELinux) guide for Fedora. Edition, 1st edition (July 27, 2006). * use non-default directories to store which covers items to include. Selinux: NSA's Open Source Security Enhanced Linux by Bill McCarty pdf download free. SELinux by Example: Using Security Enhanced Linux David Caplan, Frank Mayer, Karl Macmillan. Title, SELinux by Example: Using Security Enhanced Linux. Feel free to mail me (mmcallis redhat com) with any ideas or things you would like included. Now SELinux (Security Enhanced Linux) dramatically changes this. Now that SELinux is included in the Linux 2.6 kernel–and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions–it's easier than ever to take advantage of its benefits. The name is not decided yet, but will be something like “Security-Enhanced manage DNS and BIND (for example, allow named to accept zone updates). Authors, Frank Mayer, Karl MacMillan, David Caplan. SELinux by Example: Using Security Enhanced Linux book download.