SELinux [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

SELinux [Electronic resources] - نسخه متنی

Bill McCarty

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید









Table of Contents

Index

Reviews

Reader Reviews

Errata

Academic

SELinux

By
Bill McCarty

Publisher: OReilly

Pub Date: October 2004

ISBN: 0-596-00716-7

Pages: 254



Copyright

Preface


Organization of This Book


Conventions Used in This Book


Using Code Examples


How to Contact Us


Acknowledgments



Chapter 1.
Introducing SELinux



Section 1.1.
Software Threats and the Internet



Section 1.2.
SELinux Features



Section 1.3.
Applications of SELinux



Section 1.4.
SELinux History



Section 1.5.
Web and FTP Sites



Chapter 2.
Overview of the SELinux Security Model



Section 2.1.
Subjects and Objects



Section 2.2.
Security Contexts



Section 2.3.
Transient and Persistent Objects



Section 2.4.
Access Decisions



Section 2.5.
Transition Decisions



Section 2.6.
SELinux Architecture



Chapter 3.
Installing and Initially Configuring SELinux



Section 3.1.
SELinux Versions



Section 3.2.
Installing SELinux



Section 3.3.
Linux Distributions Supporting SELinux



Section 3.4.
Installation Overview



Section 3.5.
Installing SELinux from Binary or Source Packages



Section 3.6.
Installing from Source



Chapter 4.
Using and Administering SELinux



Section 4.1.
System Modes and SELinux Tuning



Section 4.2.
Controlling SELinux



Section 4.3.
Routine SELinux System Use and Administration



Section 4.4.
Monitoring SELinux



Section 4.5.
Troubleshooting SELinux



Chapter 5.
SELinux Policy and Policy Language Overview



Section 5.1.
The SELinux Policy



Section 5.2.
Two Forms of an SELinux Policy



Section 5.3.
Anatomy of a Simple SELinux Policy Domain



Section 5.4.
SELinux Policy Structure



Chapter 6.
Role-Based Access Control



Section 6.1.
The SELinux Role-Based Access Control Model



Section 6.2.
Railroad Diagrams



Section 6.3.
SELinux Policy Syntax



Section 6.4.
User Declarations



Section 6.5.
Role-Based Access Control Declarations



Chapter 7.
Type Enforcement



Section 7.1.
The SELinux Type-Enforcement Model



Section 7.2.
Review of SELinux Policy Syntax



Section 7.3.
Type-Enforcement Declarations



Section 7.4.
Examining a Sample Policy



Chapter 8.
Ancillary Policy Statements



Section 8.1.
Constraint Declarations



Section 8.2.
Other Context-Related Declarations



Section 8.3.
Flask-Related Declarations



Chapter 9.
Customizing SELinux Policies



Section 9.1.
The SELinux Policy Source Tree



Section 9.2.
On the Topics of Difficulty and Discretion



Section 9.3.
Using the SELinux Makefile



Section 9.4.
Creating an SELinux User



Section 9.5.
Customizing Roles



Section 9.6.
Adding Permissions



Section 9.7.
Allowing a User Access to an Existing Domain



Section 9.8.
Creating a New Domain



Section 9.9.
Using Audit2allow



Section 9.10.
Policy Management Tools



Section 9.11.
The Road Ahead



Appendix A.
Security Object Classes



Appendix B.
SELinux Operations



Appendix C.
SELinux Macros Defined in src/policy/macros



Appendix D.
SELinux General Types



Appendix E.
SELinux Type Attributes

Colophon

Index


/ 100