NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Title | NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5 PDF eBook |
Author | MIDPOINT TRADE BOOKS INC |
Publisher | Tstc Pub |
Pages | 200 |
Release | 2009-09-02 |
Genre | Computers |
ISBN | 9781934302613 |
The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Enterprise Linux 5
Title | Enterprise Linux 5 PDF eBook |
Author | National Security Administration |
Publisher | Tstc Publishing |
Pages | 0 |
Release | 2012-03 |
Genre | Linux |
ISBN | 9781936603084 |
The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions. This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.
Linux Package (Introduction to Linux and NSA Guide)
Title | Linux Package (Introduction to Linux and NSA Guide) PDF eBook |
Author | Machtelt Garrells |
Publisher | Tstc Publishing |
Pages | 0 |
Release | 2012-03 |
Genre | |
ISBN | 9781936603107 |
Bundled or separately, this pair of books is a must for the Linux learner. The Hands On Guide gives the Linux learner all he/she needs to learn basic system administration skills for Unix-like systems. The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Introduction to Linux/ Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Title | Introduction to Linux/ Guide to the Secure Configuration of Red Hat Enterprise Linux 5 PDF eBook |
Author | Machtelt Garrells |
Publisher | Tstc Pub |
Pages | |
Release | 2009-09-02 |
Genre | Computers |
ISBN | 9781934302637 |
Bundled or separately, this pair of books is a must for the Linux learner. The Hands On Guide gives the Linux learner all he/she needs to learn basic system administration skills for Unix-like systems. The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Security Strategies in Linux Platforms and Applications
Title | Security Strategies in Linux Platforms and Applications PDF eBook |
Author | Michael Jang |
Publisher | Jones & Bartlett Learning |
Pages | 538 |
Release | 2015-10-06 |
Genre | Computers |
ISBN | 1284110273 |
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.
Security Strategies in Linux Platforms and Applications
Title | Security Strategies in Linux Platforms and Applications PDF eBook |
Author | Michael H. Jang |
Publisher | Jones & Bartlett Publishers |
Pages | 538 |
Release | 2017 |
Genre | Business & Economics |
ISBN | 1284090655 |
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered sec
Security Strategies in Linux Platforms and Applications
Title | Security Strategies in Linux Platforms and Applications PDF eBook |
Author | Ric Messier |
Publisher | Jones & Bartlett Learning |
Pages | 562 |
Release | 2022-10-26 |
Genre | Computers |
ISBN | 1284289230 |
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.