Free Ebook SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan
The book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan will still offer you positive worth if you do it well. Completing the book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan to review will certainly not end up being the only goal. The goal is by obtaining the positive value from the book till completion of guide. This is why; you have to discover more while reading this SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan This is not only how quick you review a book as well as not just has the number of you completed the books; it has to do with what you have gotten from the books.
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan
Free Ebook SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan
Some individuals may be chuckling when checking out you reviewing SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan in your spare time. Some might be appreciated of you. And also some may want resemble you who have reading hobby. Just what about your personal feel? Have you felt right? Checking out SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan is a requirement and a leisure activity at the same time. This condition is the on that will certainly make you feel that you must check out. If you understand are searching for the book entitled SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan as the option of reading, you could find below.
As known, book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan is well known as the home window to open the globe, the life, as well as new thing. This is exactly what the people currently require so much. Even there are lots of people who do not like reading; it can be a choice as recommendation. When you really need the methods to create the following motivations, book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan will really guide you to the method. In addition this SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan, you will certainly have no regret to obtain it.
To get this book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan, you could not be so confused. This is online book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan that can be taken its soft file. It is different with the on-line book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan where you could buy a book and then the vendor will send out the published book for you. This is the area where you can get this SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan by online and also after having handle buying, you could download SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan by yourself.
So, when you need fast that book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan, it doesn't need to await some days to receive the book SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan You can straight obtain the book to save in your tool. Also you enjoy reading this SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan everywhere you have time, you could enjoy it to check out SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan It is undoubtedly practical for you which intend to obtain the much more precious time for reading. Why don't you spend five minutes as well as invest little money to obtain guide SELinux By Example: Using Security Enhanced Linux, By Frank Mayer, Karl MacMillan, David Caplan right here? Never allow the new thing goes away from you.
SELinux: Bring World-Class Security to Any Linux Environment!
SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel—and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions—it’s easier than ever to take advantage
of its benefits.
SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies— including the powerful new Reference Policy—showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.
• Thoroughly understand SELinux’s access control and security mechanisms
• Use SELinux to construct secure systems from the ground up
• Gain fine-grained control over kernel resources
• Write policy statements for type enforcement, roles, users, and constraints
• Use optional multilevel security to enforce information classification and manage users with diverse clearances
• Create conditional policies that can be changed on-the-fly
• Define, manage, and maintain SELinux security policies
• Develop and write new SELinux security policy modules
• Leverage emerging SELinux technologies to gain even greater flexibility
• Effectively administer any SELinux system
- Sales Rank: #1373901 in Books
- Published on: 2006-08-06
- Released on: 2006-07-27
- Original language: English
- Number of items: 1
- Dimensions: 9.00" h x 1.10" w x 6.90" l, 1.85 pounds
- Binding: Paperback
- 456 pages
Review
"The three authors are well versed in the topic and comprise the best team to write on SELinux that you could find. Even though it is written as a straightforward text - as opposed to a study guide - I appreciate how each chapter ends with a summary and then exercises to reinforce what you've just finished reading. "--Emmett Dulaney, Editor, UnixReview.com
"This is a very good book and is easily the best I've seen yet on the subject of SELinux. If you've been tasked with maintaining an SELinux-enabled machine, would like to write or enhance existing SELinux policy, or just want to understand what SELinux is and how it came to be, then this is the book for you. "--Ryan Maple, Reviewer, LinuxSecurity.com
From the Back Cover
SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel--and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions--it's easier than ever to take advantage
of its benefits. "SELinux by Example "is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies-- including the powerful new "Reference Policy"--showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. - Thoroughly understand SELinux's access control and security mechanisms- Use SELinux to construct secure systems from the ground up- Gain fine-grained control over kernel resources- Write policy statements for type enforcement, roles, users, and constraints - Use optional multilevel security to enforce information classification and manage users with diverse clearances- Create conditional policies that can be changed on-the-fly- Define, manage, and maintain SELinux security policies- Develop and write new SELinux security policy modules- Leverage emerging SELinux technologies to gain even greater flexibility- Effectively administer any SELinux system
About the Author
Frank Mayer is cofounder and Chief Technology Officer of Tresys Technology, and has 23 years of experience in the design, development, and analysis of secure operating systems. He has been an active contributor to SELinux for six years, and has initiated and participated in the development of many new SELinux innovations and tools. He also chairs the annual SELinux Symposium. Frank has published many papers on secure and trustworthy operating systems, and has also explored security in parallel computing, networks, and enterprise applications.
Karl MacMillan is an active contributor in the SELinux community and has led the development of many important SELinux features. He is also a sought after speaker and consultant, and has helped many individuals and organizations understand and apply strong computer security with SELinux. Previous to his work on SELinux, Karl made important contributions in the fields of pattern recognition and evolutionary computing as applied to document and audio recognition, where he has numerous published papers.
David Caplan is a senior security engineer at Tresys Technology with over 20 years of experience in computer security and a wide range of other programming- and software-related areas. He has worked with SELinux for six years as a contributor to many of the SELinux-related open source projects and has led multiple efforts in analyzing and constructing SELinux policy for a variety of systems.
Most helpful customer reviews
20 of 20 people found the following review helpful.
Great grounding but going out of date quickly
By Christian R. Unger
SELinux by Example is not my first venture into learning about SELinux, but in fact my second. My first was the study guide for the RedHat SELinux Exam (which you only get if you pay for the course, so i realise it is not a cheap option). While the Red Hat material is very limited (to be covered in 4 days and with the aim of preparing you for an exam) it has three gleaming advantages:
1) it is current
2) the exercises are practical and come with solution in the book; and
3) there are nowhere near as many mistakes.
So let's cut to the downsides of this book:
1) it's dated (now in 2008)
2) there are mistakes, many mistakes but thankfully most are obvious
3) there are no easily accessible answers. They might be online, but so far i have not found them...
So that sounds pretty bad, but actually the book is very good, mainly because of its depth. It seems to go through the entire beast that is SELinux, using non-contrived examples of policy. Unfortunately it does not help you in administering your system all that much (though there is a chapter devoted to this). The reason for this is simple: this book aims to tell you how SELinux works, rather than how to use it. In other words, this book needs to be read together with something more practical. The practical content of the book is probably confined to the last two chapters which amounts to just shy of 70 pages out of 425 including index.
Honestly, i am torn on this: on the one hand i'm disappointed about how out of date the book has gotten, and how quickly, but at the same time i understand: SELinux is still evolving significantly AND how distro's are using it is still evolving. Just see some of the references where the book acknowledges its shortcomings: The authors know where things are headed, they know their stuff. Which on the other side of the spectrum is why this book is so good as an introduction: you cover everything, you have a really solid background of the area, but you are left wanting more, you are left wanting ... well >practical< examples, rather than the examples in the text.
I would recommend that anyone wanting to get into using SELinux get material of their distro's support site (Red Hat / Fedora have guides and links to other materials which are excellent and free) and use those materials with this book. I have yet to find a source that ties all of SELinux together so well, but at the same time, there is the sensation that this material will need a revision very soon.
One last issue is that the book is a little too formulaic. The text will inform you there is a summary of syntax on page X, where X is the page you are on and the summary is the next paragraph. It just rubs me the wrong way, it is pointing out the obvious, it is adding volume where none is needed. The text is concise, but for some reason it seems the authors want to add bloat and volume when otherwise they get right to the point.
In conclusion, consider this book a foundation, even if its not as current as you might want (and those issues are related more to module based policy writing which is covered in sufficient depths, especially because examples are included with your SELinux policy anyway), and read it with the man pages and the documentation you get with your distro and you'll be fine.
5 of 5 people found the following review helpful.
is it germane to your usage of linux?
By W Boudville
If you are a linux or unix user, then you're probably pretty familiar with the permissions settings on files. It's a basic methodology that is essentially unchanged over 20 years or more or unix development. But its shortcomings have been just as well known to unix experts over that time.
What Mayer et al demonstrate is that the latest linux 2.6 has a very interesting add-on. SELinux. It is incorporated by default. So if you're running linux 2.6, it's been present all along, hidden in the background. The book describes what it offers. A vastly improved and very granular security model. Based on the concept of type enforcement. It goes way beyond earlier implementations of Mandatory Access Control.
The book can be heavy sledding if all this is new to you. Luckily, it describes a neat GUI tool, apol, that you can run as root. It can greatly assist understanding the use and making of rules.
Most users and sysadmins of linux machines might still not require the active use of SELinux. There is a considerable investment in time needed, to understand and use it. Plus, most of the examples cited in the book refer to government or classified contexts. Outside these, you have to really ask yourself if it's germane to you.
3 of 3 people found the following review helpful.
Not well written
By Bradley Goodman
I'm about a hundred pages into the book. I am still completely confused. If this book was intended to describe SELinux "by Example" it certainly hasn't. Furthermore, it seems to be a bit out of date, focusing on old distributions like Fedora Core 5. It appears to place a lot of focus on more obscure tools (written by the author and the author's company) as opposed to the more "standard" tools which are included in standard distributions.
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan PDF
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan EPub
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan Doc
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan iBooks
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan rtf
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan Mobipocket
SELinux by Example: Using Security Enhanced Linux, by Frank Mayer, Karl MacMillan, David Caplan Kindle
Tidak ada komentar:
Posting Komentar