SELinux Cookbook
By Sven Vermeulen
Publisher: Packt Publishing
Final Release Date: September 2014
Pages: 240

In SELinux Cookbook, we cover everything from how to build SELinux policies to the integration of the technology with other systems and look at a wide range of examples to assist in creating additional policies. The first set of recipes work around file labeling as one of the most common and important SELinux administrative aspects. Then, we move on to custom policy development, showing how this is done for web application confinement, desktop application protection, and custom server policies. Next, we shift our focus to the end user, restricting user privileges and setting up role-based access controls. After that, we redirect our focus to the integration of SELinux with Linux systems, aligning SELinux with existing security controls on a Linux system. Finally, we will learn how applications interact with the SELinux subsystem internally; ensuring that whatever the challenge, we will be able to find the best solution.

Product Details
Recommended for You
Customer Reviews


by PowerReviews
oreillySELinux Cookbook

(based on 1 review)

Ratings Distribution

  • 5 Stars



  • 4 Stars



  • 3 Stars



  • 2 Stars



  • 1 Stars



Reviewed by 1 customer

Displaying review 1

Back to top


a guide to deploy security policies

By Krapesh

from India

About Me Developer, Educator

Verified Reviewer


  • Easy to understand
  • Helpful examples
  • Well-written


  • Not comprehensive enough

Best Uses

  • Expert
  • Intermediate
  • Novice
  • Student

Comments about oreilly SELinux Cookbook:

SELinux cookbook provides a good guidance on how to start up with SELinux Development
Environment for deploying information security on various levels. The book provides a good
demo on various 'recipies' that could help administrators set up a 'layered security
approach' starting from files,users roles,applications, desktops, servers, defining user roles..
The application of SELinux Environment can greatly benefit an organization as it has various options
available to deploy a layered security approach.. This can lead to a better security stance when
applied to the relevant data and/or applications.
On the other hand, system administrators can also improvise on their skills by adopting on to the SELinux
and delegating the task of security of the critical information to SELinux.

Displaying review 1

Back to top

Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook:  $26.99
Formats:  ePub, Mobi, PDF