The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions.
This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.
Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat
📄 Viewing lite version
Full site ›
Book Details
Author(s)National Security Administration
PublisherTSTC Publishing
ISBN / ASIN193660308X
ISBN-139781936603084
Sales Rank14,462,656
MarketplaceUnited States 🇺🇸