This book is a great introduction to the topic of SELinux because of the information on its developmental background and lucid description of the objectives, advantages and maintenance of a SELinux system. I would recommend this book to someone who has a firm grasp of basic security concepts and programming principles and is interested in getting exposure to the security enhanced model of Linux.
0Report
So what makes Selinux more secure than standard Linux? Primarily it is the implementation of role-based access control, sandboxing, and an audit facility that allows the system to log any attempts to exceed specified permissions. It does all this without conflicting with the normal permissions of Linux. If you are able to access a file through normal discretionary access control then the role-based mandatory access control...
0Report
Bill McCarty's book is all of the above and the requirements have been met for a throughly enjoyable read. You don't have to be a Linux geek to appreciate the security mechanisms that Information Assurance Directorate of the NSA and the myriad of contributors have helped to create. These go way beyond IT systems decisions and at their base level represent good business management practice. The days of using insecure, bloated...
0Report
Bill McCarty has done a top notch job of explaining Security Enhanced Linux as well as the security model itself. I've attempted so many time to "get it" about SELinux and not until I read this book did it make sense. Bill's organization of the material makes a huge difference. He breaks the subject down into easily understandable chunks. The reader can follow the simple road until everything makes sense. And, SE Linux does...
0Report
This book is a must read for beginners exploring the powers of SELinux and trying to setup a custom system. it has all the information needed to give a basic grounding of how everything is organised and how security is incorporqated into the kernel. it deals with the structural as well as the functional organization of the various components involved. although not exhaustive in examples there is a considerable number of'em...
0Report