Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

SELinux by Example: Using Security Enhanced Linux 1st Edition

3.7 out of 5 stars 7 customer reviews
ISBN-13: 978-0131963696
ISBN-10: 0131963694
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$4.80 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$40.74 On clicking this link, a new layer will be open
More Buying Choices
22 New from $30.00 21 Used from $4.80
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Windows10ForDummiesVideo
Windows 10 For Dummies Video Training
Get up to speed with Windows 10 with this video training course from For Dummies. Learn more.
$40.74 FREE Shipping. Only 6 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • SELinux by Example: Using Security Enhanced Linux
  • +
  • Selinux: NSA's Open Source Security Enhanced Linux
  • +
  • Hardening Linux
Total price: $110.34
Buy the selected items together

Editorial Reviews

Review

"The three authors are well versed in the topic and comprise the best team to write on SELinux that you could find. Even though it is written as a straightforward text - as opposed to a study guide - I appreciate how each chapter ends with a summary and then exercises to reinforce what you've just finished reading. "--Emmett Dulaney, Editor, UnixReview.com

 

"This is a very good book and is easily the best I've seen yet on the subject of SELinux. If you've been tasked with maintaining an SELinux-enabled machine, would like to write or enhance existing SELinux policy, or just want to understand what SELinux is and how it came to be, then this is the book for you. "--Ryan Maple, Reviewer, LinuxSecurity.com

From the Back Cover

SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel--and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions--it's easier than ever to take advantage
of its benefits. "SELinux by Example "is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies-- including the powerful new "Reference Policy"--showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. - Thoroughly understand SELinux's access control and security mechanisms- Use SELinux to construct secure systems from the ground up- Gain fine-grained control over kernel resources- Write policy statements for type enforcement, roles, users, and constraints - Use optional multilevel security to enforce information classification and manage users with diverse clearances- Create conditional policies that can be changed on-the-fly- Define, manage, and maintain SELinux security policies- Develop and write new SELinux security policy modules- Leverage emerging SELinux technologies to gain even greater flexibility- Effectively administer any SELinux system
NO_CONTENT_IN_FEATURE

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Paperback: 456 pages
  • Publisher: Prentice Hall; 1 edition (August 6, 2006)
  • Language: English
  • ISBN-10: 0131963694
  • ISBN-13: 978-0131963696
  • Product Dimensions: 6.9 x 1.1 x 9 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 3.7 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #772,102 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Christian R. Unger on January 3, 2008
Format: Paperback
SELinux by Example is not my first venture into learning about SELinux, but in fact my second. My first was the study guide for the RedHat SELinux Exam (which you only get if you pay for the course, so i realise it is not a cheap option). While the Red Hat material is very limited (to be covered in 4 days and with the aim of preparing you for an exam) it has three gleaming advantages:
1) it is current
2) the exercises are practical and come with solution in the book; and
3) there are nowhere near as many mistakes.

So let's cut to the downsides of this book:
1) it's dated (now in 2008)
2) there are mistakes, many mistakes but thankfully most are obvious
3) there are no easily accessible answers. They might be online, but so far i have not found them...

So that sounds pretty bad, but actually the book is very good, mainly because of its depth. It seems to go through the entire beast that is SELinux, using non-contrived examples of policy. Unfortunately it does not help you in administering your system all that much (though there is a chapter devoted to this). The reason for this is simple: this book aims to tell you how SELinux works, rather than how to use it. In other words, this book needs to be read together with something more practical. The practical content of the book is probably confined to the last two chapters which amounts to just shy of 70 pages out of 425 including index.

Honestly, i am torn on this: on the one hand i'm disappointed about how out of date the book has gotten, and how quickly, but at the same time i understand: SELinux is still evolving significantly AND how distro's are using it is still evolving.
Read more ›
Comment 20 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I'm about a hundred pages into the book. I am still completely confused. If this book was intended to describe SELinux "by Example" it certainly hasn't. Furthermore, it seems to be a bit out of date, focusing on old distributions like Fedora Core 5. It appears to place a lot of focus on more obscure tools (written by the author and the author's company) as opposed to the more "standard" tools which are included in standard distributions.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
If you are a linux or unix user, then you're probably pretty familiar with the permissions settings on files. It's a basic methodology that is essentially unchanged over 20 years or more or unix development. But its shortcomings have been just as well known to unix experts over that time.

What Mayer et al demonstrate is that the latest linux 2.6 has a very interesting add-on. SELinux. It is incorporated by default. So if you're running linux 2.6, it's been present all along, hidden in the background. The book describes what it offers. A vastly improved and very granular security model. Based on the concept of type enforcement. It goes way beyond earlier implementations of Mandatory Access Control.

The book can be heavy sledding if all this is new to you. Luckily, it describes a neat GUI tool, apol, that you can run as root. It can greatly assist understanding the use and making of rules.

Most users and sysadmins of linux machines might still not require the active use of SELinux. There is a considerable investment in time needed, to understand and use it. Plus, most of the examples cited in the book refer to government or classified contexts. Outside these, you have to really ask yourself if it's germane to you.
1 Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book offers a lot of information on the subject, and seems to focus generally on policy writing. However, there are a lot of new features in the newer Fedora Cores that it doesn't cover very well. Also, it talks about a lot of issues that, as long as you don't have a super old system, don't really matter anymore.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

SELinux by Example: Using Security Enhanced Linux
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: SELinux by Example: Using Security Enhanced Linux