Top Secret: Guide to the Secure Configuration of Red Hat Enterprise Linux 5
📄 Viewing lite version
Full site ›
Book Details
PublisherTSTC Publishing
ISBN / ASIN1934302635
ISBN-139781934302637
AvailabilityUsually ships in 24 hours
Sales Rank6,062,473
MarketplaceUnited States 🇺🇸
Description ▲
Bundled or separately, this pair of books is a must for the Linux learner. The Hands On Guide gives the Linux learner all he/she needs to learn basic system administration skills for Unix-like systems. The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.