The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions.This book is available separately or bundled together with Introduction to A Hands-On Guide .
"synopsis" may belong to another edition of this title.
The National Security Agency offers this Guide to the Secure Configuration of Red Hat Enterprise Linux 5 as Revision 4.1 as of February 28, 2011. It is the Operating Systems Division Unix Team of the Systems and Network Analysis Center.
"About this title" may belong to another edition of this title.
US$ 3.75 shipping within U.S.A.
Destination, rates & speedsSeller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_324931473
Quantity: 1 available