Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat

Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat

by National Security Administration
     
 

The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and

Overview

The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.

Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions.

This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.

Product Details

ISBN-13:
9781936603084
Publisher:
Texas State Technical College Publishing
Publication date:
03/01/2012
Pages:
200
Product dimensions:
8.40(w) x 10.80(h) x 0.50(d)

Meet the Author

The National Security Agency offers this Guide to the Secure Configuration of Red Hat Enterprise Linux 5 as Revision 4.1 as of February 28, 2011. It is the Operating Systems Division Unix Team of the Systems and Network Analysis Center.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >