SELinux System Administration - Second Edition

Nonfiction, Computers, Operating Systems, Unix, Linux, Networking & Communications, Computer Security
Cover of the book SELinux System Administration - Second Edition by Sven Vermeulen, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Sven Vermeulen ISBN: 9781787127067
Publisher: Packt Publishing Publication: December 16, 2016
Imprint: Packt Publishing Language: English
Author: Sven Vermeulen
ISBN: 9781787127067
Publisher: Packt Publishing
Publication: December 16, 2016
Imprint: Packt Publishing
Language: English

Ward off traditional security permissions and effectively secure your Linux systems with SELinux

About This Book

  • Leverage SELinux to improve the secure state of your Linux system
  • A clear approach to adopting SELinux within your organization
  • Essential skills and techniques to help further your system administration career

Who This Book Is For

This book is for Linux administrators who want to control the secure state of their systems. It's packed with the latest information on SELinux operations and administrative procedures so you'll be able to further harden your system through mandatory access control (MAC) – a security strategy that has been shaping Linux security for years.

What You Will Learn

  • Analyze SELinux events and selectively enable or disable SELinux enforcement
  • Manage Linux users and associate them with the right role and permission set
  • Secure network communications through SELinux access controls
  • Tune the full service flexibility by dynamically assigning resource labels
  • Handle SELinux access patterns enforced through the system
  • Query the SELinux policy in depth

In Detail

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay.

This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux.

By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

Style and approach

This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Ward off traditional security permissions and effectively secure your Linux systems with SELinux

About This Book

Who This Book Is For

This book is for Linux administrators who want to control the secure state of their systems. It's packed with the latest information on SELinux operations and administrative procedures so you'll be able to further harden your system through mandatory access control (MAC) – a security strategy that has been shaping Linux security for years.

What You Will Learn

In Detail

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay.

This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux.

By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

Style and approach

This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.

More books from Packt Publishing

Cover of the book Microsoft System Center 2016 Orchestrator Cookbook - Second Edition by Sven Vermeulen
Cover of the book Social Data Visualization with HTML5 and JavaScript by Sven Vermeulen
Cover of the book TextMate How-To by Sven Vermeulen
Cover of the book Getting Started with nopCommerce by Sven Vermeulen
Cover of the book Industrial Cybersecurity by Sven Vermeulen
Cover of the book Mastering Android Game Development by Sven Vermeulen
Cover of the book Hands-On SAS For Data Analysis by Sven Vermeulen
Cover of the book Machine Learning with Core ML by Sven Vermeulen
Cover of the book Mastering SoapUI by Sven Vermeulen
Cover of the book Multiplayer Game Development with HTML5 by Sven Vermeulen
Cover of the book SFML Essentials by Sven Vermeulen
Cover of the book Visual Studio 2013 Cookbook by Sven Vermeulen
Cover of the book Instant XBMC by Sven Vermeulen
Cover of the book vSphere High Performance Cookbook by Sven Vermeulen
Cover of the book Mastering Java for Data Science by Sven Vermeulen
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy