SELinux [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

SELinux [Electronic resources] - نسخه متنی

Bill McCarty

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








Chapter 5. SELinux Policy and Policy Language Overview


Chapter 2 examined the SELinux security model
from a bird's-eye perspective. The purpose of that
chapter was to acquaint you with SELinux just enough to enable you to
understand the procedure for installing and initially configuring
SELinux. In the long run, you're likely to need to
know significantly more about the SELinux security model. So this
chapter picks up where Chapter 2 left off,
explaining the SELinux security model and SELinux policies in greater
detail and laying the groundwork for the following chapters, which
explain the SELinux policy language in detail.


For convenience, this chapter recapitulates some of the key concepts
and terms introduced in Chapter 2. However, I
assume that you're generally familiar with and able
to recall the material from that chapter. If you find this chapter
difficult to follow, I suggest that you revisit Chapter 2 and then return to this chapter. I
anticipate that you'll find this chapter much
clearer when the material from Chapter 2 is
fresh in your mind.


/ 100