Chapter 1. Introducing SELinux
1.1 Software Threats and the Internet
Chapter 2. Overview of the SELinux Security Model
2.3 Transient and Persistent Objects
Chapter 3. Installing and Initially Configuring SELinux
3.3 Linux Distributions Supporting SELinux
3.5 Installing SELinux from Binary or Source Packages
Chapter 4. Using and Administering SELinux
4.1 System Modes and SELinux Tuning
4.3 Routine SELinux System Use and Administration
Chapter 5. SELinux Policy and Policy Language Overview
5.2 Two Forms of an SELinux Policy
5.3 Anatomy of a Simple SELinux Policy Domain
Chapter 6. Role-Based Access Control
6.1 The SELinux Role-Based Access Control Model
6.5 Role-Based Access Control Declarations
7.1 The SELinux Type-Enforcement Model
7.2 Review of SELinux Policy Syntax
7.3 Type-Enforcement Declarations
Chapter 8. Ancillary Policy Statements
8.2 Other Context-Related Declarations
8.3 Flask-Related Declarations
Chapter 9. Customizing SELinux Policies
9.1 The SELinux Policy Source Tree
9.2 On the Topics of Difficulty and Discretion
9.3 Using the SELinux Makefile
9.7 Allowing a User Access to an Existing Domain
Appendix A. Security Object Classes
Appendix B. SELinux Operations
Appendix C. SELinux Macros Defined in src/policy/macros
Appendix D. SELinux General Types
Appendix E. SELinux Type Attributes