Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SELinux: NSA's Open Source Security Enhanced Linux

Buy
This small but information-packed book covers the wide range of knowledge needed to secure your system using this respected extension to Linux. SELinux discusses critical topics, such as SELinux concepts and its security model; installation instructions; system and user administration; understanding, implementing, and developing your own SELinux security policies. With SELinux, a high-security computer is within reach of any system administrator, and this book provides the means.

As a security researcher and author of computer books, I work hard to stay abreast of the latest technological developments. So, I'd been tracking Security Enhanced Linux (SELinux) on my technology radar for several years. But, frankly, it didn't seem to me easy enough, or robust enough, for dependable use by Linux system administrators.

About one year ago, SELinux seemed to grow up suddenly. I now believe that SELinux is the most important computing technology for Linux users that I've seen in the last several years. Obviously, others agree that SELinux is important and useful: SELinux has been incorporated into Fedora Core, Gentoo, and SUSE Linux. And by the time this book is in print, it's expected to be part of Red Hat Enterprise Linux.

Of course, as a good friend of mine—who happens to be an economist—is fond of saying, "There's no such thing as a free lunch." Like other security technologies, SELinux must be properly installed, configured, and maintained if it is to be effective. This book will help you understand and intelligently use SELinux. Whether you prefer to use the sample SELinux security policies delivered as part of a Linux distribution or to implement your own customized policies, this book will show you the way.

One thing SELinux: NSA's Open Source Security Enhanced Linux doesn't do is explain how to write programs that use the SELinux API. I anticipate that this book will be useful to those who want to write such programs. But SELinux is designed for system administrators, not programmers, and therefore doesn't assume programming skills or expertise. Consequently, those interested in using the SELinux API will have to supplement the material presented in this book with information obtained from SELinux documentation and other sources.

(HTML tags aren't allowed.)

The Negative (Ansel Adams Photography, Book 2)
The Negative (Ansel Adams Photography, Book 2)
The Negative is the second volume in the acclaimed and highly influential The Ansel Adams Photography Series. This second volume is anchored by a detailed discussion of Adams' Zone System and his seminal concept of visualization. It presents detailed discussion of artificial and natural light, film and exposure, and darkroom equipment and...
Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Systems Analysis and Design, Eighth Edition offers a practical, visually appealing approach to information systems development.

As the Dilbert cartoon suggests, it is always a good idea to know whether a project fits the company’s overall strategy. You will learn more about the relationship between systems projects and...

Learning Python (Help for Programmers)
Learning Python (Help for Programmers)
This book provides a quick introduction to the Python programming language. Python is a popular object-oriented language used for both standalone programs and scripting applications in a variety of domains. It's free, portable, powerful, and remarkably easy to use. Whether you're new to programming or a professional developer, this...

Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem
Hands-On Markov Models with Python: Implement probabilistic models for learning complex data sequences using the Python ecosystem

Unleash the power of unsupervised machine learning in Hidden Markov Models using TensorFlow, pgmpy, and hmmlearn

Key Features

  • Build a variety of Hidden Markov Models (HMM)
  • Create and apply models to any sequence of data to analyze, predict, and extract valuable...
Digital Futures: Living in a dot.com World
Digital Futures: Living in a dot.com World
Beyond the hype about dot-coms, WAP phones and dot-com entrepreneurs, what impacts will e-commerce have on society? How will it affect jobs and local communities? What will it mean for energy use, transport and the future shape of our cities? How can we ensure that everyone enjoys the benefits of the new digital technologies?

With
...
The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing)
The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing)

The knowledge, skill, and expertise of any true professional often can be gauged by the library of literature that he or she keeps and has read. In the often mysterious, secretive, and intriguing world of locks and locksmithing, no true professional, aficionado, or curiosity seeker would be without The Complete Book of Locks and Locksmithing,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy