当前位置: 首页 > 资源下载 > 系统管理 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

SELinux: NSA’s Open Source Security Enhanced Linux Enhanced

SELinux: NSA’s Open Source Security Enhanced Linux Enhanced

书名:SELinux: NSA’s Open Source Security Enhanced Linux Enhanced

上传:石头

时间:2009-09-05

文件大小:1.04 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Bill McCarty
出版日期:October 11, 2004
出版社:O'Reilly
页数:254
ISBN:ISBN-10: 0596007167 ISBN-13: 978-0596007164
文件格式:CHM

Product Description
The intensive search for a more secure operating system has often lefteveryday, production computers far behind their experimental, researchcousins. Now SELinux (Security Enhanced Linux) dramatically changesthis. This best-known and most respected security-related extension toLinux embodies the key advances of the security field. Better yet,SELinux is available in widespread and popular distributions of theLinux operating system–including for Debian, Fedora, Gentoo, Red HatEnterprise Linux, and SUSE–all of it free and open source. SELinuxemerged from research by the National Security Agency and implementsclassic strong-security measures such as role-based access controls,mandatory access controls, and fine-grained transitions and privilegeescalation following the principle of least privilege. It compensatesfor the inevitable buffer overflows and other weaknesses inapplications by isolating them and preventing flaws in one applicationfrom spreading to others. The scenarios that cause the mostcyber-damage these days–when someone gets a toe-hold on a computerthrough a vulnerability in a local networked application, such as a Webserver, and parlays that toe-hold into pervasive control over thecomputer system–are prevented on a properly administered SELinuxsystem. The key, of course, lies in the words “properly administered.”A system administrator for SELinux needs a wide range of knowledge,such as the principles behind the system, how to assign differentprivileges to different groups of users, how to change policies toaccommodate new software, and how to log and track what is going on.And this is where SELinux is invaluable. Author Bill McCarty, asecurity consultant who has briefed numerous government agencies,incorporates his intensive research into SELinux into this small butinformation-packed book. Topics include:
A readable and concrete explanation of SELinux concepts and the SELinux security modelInstallation instructions for numerous distributionsBasic system and user administrationA detailed dissection of the SELinux policy languageExamples and guidelines for altering and adding policiesWith SELinux, a high-security computer is within reach ofany system administrator. If you want an effective means of securingyour Linux system–and who doesn’t?–this book provides the means.
About the Author
Bill McCarty is a Professor of Information Technology at Azusa PacificUniversity, Azusa, California. Bill is also the author of over fifteentechnical books and numerous papers and presentations. He serves aseditor of the Honeynet Files department of the journal IEEE Securityand Privacy, and directs the Azusa Pacific University Honeynet ResearchProject, which is affiliated with the Honeynet Project’s HoneynetResearch Alliance. Bill has briefed members of US organizations such asthe CIA, DISA, FBI, NASA, and NSA, and non-US organizations such as theUK’s CESG and GHQ, on his honeynet research. He has worked with the FBIto prevent and detect computer crimes.
Tags:EnhancedLinuxNSASecuritySource


相关书籍

  • Implementing Database Security and Auditing (PDF 英文版)
  • Linux Device Drivers, 3rd Edition
  • Embedded Java Security: Security for Mobile Devices (PDF 英文版)
  • Linux© Troubleshooting for System Administrators and Power Users
  • Linux指令速查手册(中文PDF)

评论 (0) All

登陆 | 还没注册?