|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm85872880 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
070315s2006 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCG
|d TXJ
|d CEF
|d OCLCQ
|d MBB
|d DEBSZ
|d OCLCQ
|d OCLCO
|d C6I
|d OCLCF
|d OCLCQ
|d MKN
|d BAKER
|d BDX
|d OCLCQ
|d COO
|d OCLCQ
|d YDX
|d OCLCQ
|d AU@
|d WYU
|d OCLCQ
|d OCLCO
|d CNCEN
|d OCLCQ
|d RDF
|d OCLCE
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 71823889
|a 1004902450
|a 1005102513
|a 1288252996
|
020 |
|
|
|a 0131963694
|
020 |
|
|
|a 9780131963696
|
020 |
|
|
|a 9780132055130
|
020 |
|
|
|a 0132055139
|
024 |
1 |
|
|a 076092040347
|
024 |
3 |
|
|a 9780131963696
|
029 |
1 |
|
|a AU@
|b 000067099032
|
029 |
1 |
|
|a CHBIS
|b 006149298
|
029 |
1 |
|
|a CHVBK
|b 171328922
|
029 |
1 |
|
|a DEBSZ
|b 355364174
|
029 |
1 |
|
|a GBVCP
|b 617236739
|
029 |
1 |
|
|a HEBIS
|b 291435211
|
029 |
1 |
|
|a AU@
|b 000073552279
|
035 |
|
|
|a (OCoLC)85872880
|z (OCoLC)71823889
|z (OCoLC)1004902450
|z (OCoLC)1005102513
|z (OCoLC)1288252996
|
037 |
|
|
|a CL0500000008
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.O63
|b M3738 2006
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mayer, Frank,
|d 1961-
|
245 |
1 |
0 |
|a SELinux by example :
|b using security enhanced Linux /
|c Frank Mayer, Karl MacMillan, David Caplan.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b Prentice Hall,
|c 2006.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Prentice Hall open source software development series
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g pt. I.
|t SELinux overview --
|g Ch. 1.
|t Background --
|g Ch. 2.
|t Concepts --
|g Ch. 3.
|t Architecture --
|g pt. II.
|t SELinux policy language --
|g Ch. 4.
|t Object classes and permissions --
|g Ch. 5.
|t Type enforcement --
|g Ch. 6.
|t Roles and users --
|g Ch. 7.
|t Constraints --
|g Ch. 8.
|t Multilevel security --
|g Ch. 9.
|t Conditional policies --
|g Ch. 10.
|t Object labeling --
|g pt. III.
|t Creating and writing SELinux security policies --
|g Ch. 11.
|t Original example policy --
|g Ch. 12.
|t Reference policy --
|g Ch. 13.
|t Managing an SELinux system --
|g Ch. 14.
|t Writing policy modules --
|g App. A.
|t Obtaining SELinux sample policies --
|g App. B.
|t Participation and further information --
|g App. C.
|t Object classes and permissions --
|g App. D.
|t SELinux commands and utilities.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
8 |
|
|a SELinux: Bring World-Class Security to Any Linux Environment! € SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel & mdash;and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions & mdash;it & rsquo;s easier than ever to take advantage of its benefits. € SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies & mdash; including the powerful new Reference Policy & mdash;showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. € & bull; Thoroughly understand SELinux & rsquo;s access control and security mechanisms & bull; Use SELinux to construct secure systems from the ground up & bull; Gain fine-grained control over kernel resources & bull; Write policy statements for type enforcement, roles, users, and constraints & bull; Use optional multilevel security to enforce information classification and manage users with diverse clearances & bull; Create conditional policies that can be changed on-the-fly & bull; Define, manage, and maintain SELinux security policies & bull; Develop and write new SELinux security policy modules & bull; Leverage emerging SELinux technologies to gain even greater flexibility & bull; Effectively administer any SELinux system.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux.
|2 blmlsh
|
630 |
0 |
7 |
|a Linux
|2 fast
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a Operating systems (Computers)
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|
700 |
1 |
|
|a MacMillan, Karl,
|d 1975-
|
700 |
1 |
|
|a Caplan, David,
|d 1963-
|
776 |
0 |
8 |
|i Print version:
|a Mayer, Frank, 1961-
|t SELinux by example.
|d Upper Saddle River, N.J. : Prentice Hall, 2006
|z 0131963694
|z 9780131963696
|w (DLC) 2006012657
|w (OCoLC)67405551
|
776 |
0 |
8 |
|i Online version:
|a Mayer, Frank, 1961-
|t SELinux by example.
|d Upper Saddle River, N.J. : Prentice Hall, 2006
|w (OCoLC)1288252996
|
830 |
|
0 |
|a Prentice Hall open source software development series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0131963694/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Baker & Taylor
|b BKTY
|c 44.99
|d 44.99
|i 0131963694
|n 0006752337
|s active
|
938 |
|
|
|a Brodart
|b BROD
|n 05904080
|c $49.99
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14827239
|
994 |
|
|
|a 92
|b IZTAP
|