This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment. Covers Red Hat Enterprise Linux 5 and 6 Install, maintain, and update software Learn how to modify file and directory permissions to prevent unauthorized users Prevent unauthorized people from gaining shell access to accounts, particularly to privileged accounts Master SELinux configuration Configure logging, log monitoring, and auditing, using tools included with RHEL5 In-depth coverage of base services that are configured to start up on boot in a RHEL5 default installation
"synopsis" may belong to another edition of this title.
US$ 5.50 shipping within U.S.A.
Destination, rates & speedsSeller: The Book Bin, Salem, OR, U.S.A.
Paperback. Condition: Very Good. First Edition. Binding firm, cover shiny, interior clean and unmarked. Seller Inventory # CORV-BBC-OK91974
Quantity: 1 available