|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn892045654 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
141003s2014 xx o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d OCLCQ
|d N$T
|d OCLCQ
|d COO
|d OCLCF
|d YDXCP
|d STF
|d B24X7
|d OCLCQ
|d TEFOD
|d OCLCQ
|d FEM
|d AGLDB
|d ICA
|d XFH
|d MERUC
|d OCLCQ
|d OCLCO
|d D6H
|d OCLCQ
|d OCLCO
|d VNS
|d VTS
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 907286337
|a 968109824
|a 969029208
|a 994403514
|
020 |
|
|
|a 9781783989676
|q (electronic bk.)
|
020 |
|
|
|a 178398967X
|q (electronic bk.)
|
020 |
|
|
|a 1322152993
|q (electronic bk.)
|
020 |
|
|
|a 9781322152998
|q (electronic bk.)
|
020 |
|
|
|z 9781783989669
|
020 |
|
|
|z 1783989661
|
029 |
1 |
|
|a AU@
|b 000058967131
|
029 |
1 |
|
|a CHNEW
|b 000888893
|
029 |
1 |
|
|a CHVBK
|b 374476128
|
029 |
1 |
|
|a DEBSZ
|b 484729411
|
029 |
1 |
|
|a AU@
|b 000067099031
|
035 |
|
|
|a (OCoLC)892045654
|z (OCoLC)907286337
|z (OCoLC)968109824
|z (OCoLC)969029208
|z (OCoLC)994403514
|
037 |
|
|
|a 2E78B78B-598A-4198-8911-56E9E463AA34
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.76.O63
|
072 |
|
7 |
|a COM
|x 046070
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 046030
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 088010
|2 bisacsh
|
082 |
0 |
4 |
|a 005.432
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vermeulen, Sven.
|
245 |
1 |
0 |
|a SELinux Cookbook.
|
260 |
|
|
|b Packt Publishing,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This book covers how to build SELinux policies and the integration of the technology with other systems and looks at a wide range of examples to assist in creating additional policies. You will learn how to manage resource labels and fine-tune your policies to automatically handle labeling; gain insight into how to tune the web server SELinux policy for secure web application hosting; confine desktop applications through custom-built policies; protect a server's assets by creating your own service-specific SELinux policies; discover how to restrict users without hindering them by installing role-based access control; troubleshoot and debug the behavior of SELinux-enabled applications. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: The SELinux Development Environment; Introduction; Creating the development environment; Building a simple SELinux module; Calling refpolicy interfaces; Creating our own interface; Using the refpolicy naming convention; Distributing SELinux policy modules; Chapter 2: Dealing with File Labels; Introduction; Defining file contexts through patterns; Using substitution definitions; Enhancing an SELinux policy with file transitions; Setting resource-sensitivity labels.
|
505 |
8 |
|
|a Configuring sensitivity categoriesChapter 3: Confining Web Applications; Introduction; Listing conditional policy support; Enabling user directory support; Assigning web content types; Using different web server ports; Using custom content types; Creating a custom CGI domain; Setting up mod_selinux; Starting Apache with limited clearance; Mapping HTTP users to contexts; Using source address mapping to decide on contexts; Separating virtual hosts with mod_selinux; Chapter 4: Creating a Desktop Application Policy; Introduction; Researching the application''s logical design.
|
505 |
8 |
|
|a Creating a skeleton policySetting context definitions; Defining application role interfaces; Testing and enhancing the policy; Ignoring permissions we don''t need; Creating application resource interfaces; Adding conditional policy rules; Adding build-time policy decisions; Chapter 5: Creating a Server Policy; Introduction; Understanding the service; Choosing resource types wisely; Differentiating policies based on use cases; Creating resource-access interfaces; Creating exec, run, and transition interfaces; Creating a stream-connect interface; Creating the administrative interface.
|
505 |
8 |
|
|a Chapter 6: Setting Up Separate RolesIntroduction; Managing SELinux users; Mapping Linux users to SELinux users; Running commands in a specified role with sudo; Running commands in a specified role with runcon; Switching roles; Creating a new role; Initial role based on entry; Defining role transitions; Looking into access privileges; Chapter 7: Choosing the Confinement Level; Introduction; Finding common resources; Defining common helper domains; Documenting common privileges; Granting privileges to all clients; Creating a generic application domain.
|
505 |
8 |
|
|a Building application-specific domains using templatesUsing fine-grained application domain definitions; Chapter 8: Debugging SELinux; Introduction; Identifying whether SELinux is to blame; Analyzing SELINUX_ERR messages; Logging positive policy decisions; Looking through SELinux constraints; Ensuring an SELinux rule is never allowed; Using strace to clarify permission issues; Using strace against daemons; Auditing system behavior; Chapter 9: Aligning SELinux with DAC; Introduction; Assigning a different root location to regular services.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux.
|2 fast
|0 (OCoLC)fst01382136
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Linux.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x UNIX.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x System Administration
|x Linux & UNIX Administration.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|a Vermeulen, Sven.
|t SELinux cookbook : over 70 hands-on recipes to develop fully functional policies to confine your applications and users using SELinux.
|d Birmingham, England : Packt Publishing, ©2014
|h iii, 224 pages
|z 9781783989669
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=853662
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27089873
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00093161
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1797263
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 853662
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29836765
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12092501
|
994 |
|
|
|a 92
|b IZTAP
|