|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
OR_on1224364058 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
201128s2020 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d NLW
|d YDX
|d N$T
|d UKMGB
|d OCLCF
|d OCLCO
|d TEFOD
|d OCLCQ
|
015 |
|
|
|a GBC188982
|2 bnb
|
016 |
7 |
|
|a 020037395
|2 Uk
|
019 |
|
|
|a 1252972802
|a 1391847857
|
020 |
|
|
|a 9781800208537
|
020 |
|
|
|a 1800208537
|
020 |
|
|
|z 9781800201477
|
029 |
1 |
|
|a AU@
|b 000068857675
|
029 |
1 |
|
|a UKMGB
|b 020037395
|
029 |
1 |
|
|a AU@
|b 000069310290
|
035 |
|
|
|a (OCoLC)1224364058
|z (OCoLC)1252972802
|z (OCoLC)1391847857
|
037 |
|
|
|a 9781800208537
|b Packt Publishing Pvt. Ltd
|
037 |
|
|
|a E5B3233B-203F-4724-9CD2-1482754043A4
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.774.L46
|
082 |
0 |
4 |
|a 005.432
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vermeulen, Sven.
|
245 |
1 |
0 |
|a SELinux System Administration - Third Edition
|h [electronic resource] :
|b Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2020.
|
300 |
|
|
|a 1 online resource (459 p.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles
|
505 |
8 |
|
|a Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off
|
505 |
8 |
|
|a Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why
|
505 |
8 |
|
|a Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon
|
505 |
8 |
|
|a Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories
|
500 |
|
|
|a Using multilevel security on files.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux.
|2 fast
|0 (OCoLC)fst01382136
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x System Administration
|x Linux & UNIX Administration.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Linux.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|0 (OCoLC)fst01046280
|
776 |
0 |
8 |
|i Print version:
|a Vermeulen, Sven
|t SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux
|d Birmingham : Packt Publishing, Limited,c2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781800201477/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301732257
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6406419
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2670812
|
994 |
|
|
|a 92
|b IZTAP
|