Cargando…

SELinux System Administration - Third Edition Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vermeulen, Sven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2020.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1224364058
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 201128s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d NLW  |d YDX  |d N$T  |d UKMGB  |d OCLCF  |d OCLCO  |d TEFOD  |d OCLCQ 
015 |a GBC188982  |2 bnb 
016 7 |a 020037395  |2 Uk 
019 |a 1252972802  |a 1391847857 
020 |a 9781800208537 
020 |a 1800208537 
020 |z 9781800201477 
029 1 |a AU@  |b 000068857675 
029 1 |a UKMGB  |b 020037395 
029 1 |a AU@  |b 000069310290 
035 |a (OCoLC)1224364058  |z (OCoLC)1252972802  |z (OCoLC)1391847857 
037 |a 9781800208537  |b Packt Publishing Pvt. Ltd 
037 |a E5B3233B-203F-4724-9CD2-1482754043A4  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.774.L46 
082 0 4 |a 005.432  |2 23 
049 |a UAMI 
100 1 |a Vermeulen, Sven. 
245 1 0 |a SELinux System Administration - Third Edition  |h [electronic resource] :  |b Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. 
250 |a 3rd ed. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2020. 
300 |a 1 online resource (459 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles 
505 8 |a Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off 
505 8 |a Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why 
505 8 |a Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon 
505 8 |a Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories 
500 |a Using multilevel security on files. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Linux. 
630 0 7 |a Linux.  |2 fast  |0 (OCoLC)fst01382136 
650 0 |a Operating systems (Computers) 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 7 |a operating systems.  |2 aat 
650 7 |a COMPUTERS  |x System Administration  |x Linux & UNIX Administration.  |2 bisacsh 
650 7 |a COMPUTERS  |x Operating Systems  |x Linux.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
776 0 8 |i Print version:  |a Vermeulen, Sven  |t SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux  |d Birmingham : Packt Publishing, Limited,c2020 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781800201477/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 301732257 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6406419 
938 |a EBSCOhost  |b EBSC  |n 2670812 
994 |a 92  |b IZTAP