Guide to the Secure Configuration of Red Hat Enterprise Linux 5 - Softcover

National Security Administration

 
9781934302613: Guide to the Secure Configuration of Red Hat Enterprise Linux 5

Synopsis

The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.

"synopsis" may belong to another edition of this title.