Linux Central cd-roms Commercial Linux distributions and software Linux books Linux games! Serial display modules Cool Linux gear!
Linux Central home page
--- Product Finder: ---

processor platform:
Product catalog
Linux Central CD-ROMs
Commercial Linux Distributions
Linux Applications and Software
Linux Books
Technical Books
Serial Display Modules
Bootable Network Cards
Linux Gear
Training and Certification
Shipping & Handling Options
About Linux Central
Contact us
Link us

Managed Linux Servers

[view your shopping cart]
 / root / Linux Books / Security
product shot
in stock
ships in:
24 hrs.
release date:
October 2004
list price:
our price:
you save:
status: current
Author(s): Bill McCarty
language: English
pages: 238
ISBN: 0596007167
related links
NSA's Open Source Security Enhanced Linux
This small but information-packed book covers the wide range of knowledge needed to secure your system using this respected extension to Linux. SELinux discusses critical topics, such as SELinux concepts and its security model; installation instructions; system and user administration; understanding, implementing, and developing your own SELinux security policies. With SELinux, a high-security computer is within reach of any system administrator, and this book provides the means.
product description

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source.

SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system.

The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book.

With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.

related links
manufacturer website

  product features
Topics include:
A readable and concrete explanation of SELinux concepts and the SELinux security model
Installation instructions for numerous distributions
Basic system and user administration
A detailed dissection of the SELinux policy language
Examples and guidelines for altering and adding policies

  product contents
back to top