Red Hat Linux Security and Optimization
Title | Red Hat Linux Security and Optimization PDF eBook |
Author | Mohammed J. Kabir |
Publisher | *Red Hat |
Pages | 724 |
Release | 2002 |
Genre | Computers |
ISBN |
CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools.
Red Hat Linux Security
Title | Red Hat Linux Security PDF eBook |
Author | George M. Doss |
Publisher | Wordware Publishing |
Pages | 340 |
Release | 2000 |
Genre | Computers |
ISBN | 9781556227738 |
Security is increasingly a concern among system administrators, including those using Red Hat Linux. "Learn Red Hat Linux Security" shows experienced system administrators a process for implementing Red Hat Linux into an overall security management system. In addition to a review of the basic computer security issues common to all systems, the book provides an in-depth discussion of security issues concerning major components of the Red Hat Linux filesystem; tools for maintaining security; and advanced security techniques. The appendixes contain definitions for terms and acronyms used in networking and Internet security; Linux security commands; Linux security weaknesses; sites related to security; and listings of networking HOWTOs, networking RFCs, and man pages for networking administration and maintenance. The companion CD-ROM contains the official Red Hat Linux 6.2 operating system for Intel computers. George M. Doss is a technical writer in Dallas, Texas, with over 20 years of experience in the computer and telecommunications fields. His titles with Wordware include "Learn Red Hat Linux OS Tips" and "Learn Red Hat Linux Server Tips".
NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Title | NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5 PDF eBook |
Author | MIDPOINT TRADE BOOKS INC |
Publisher | Tstc Pub |
Pages | 200 |
Release | 2009-09-02 |
Genre | Computers |
ISBN | 9781934302613 |
The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Red Hat Linux Networking and System Administration
Title | Red Hat Linux Networking and System Administration PDF eBook |
Author | Terry Collings |
Publisher | *Red Hat |
Pages | 1012 |
Release | 2004-02-20 |
Genre | Computers |
ISBN | 9780764544989 |
* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools * Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network * Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice * Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).
Enterprise Linux 5
Title | Enterprise Linux 5 PDF eBook |
Author | National Security Administration |
Publisher | Tstc Publishing |
Pages | 0 |
Release | 2012-03 |
Genre | Linux |
ISBN | 9781936603084 |
The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions. This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.
The Lab Guide for Red Hat Enterprise Linux 7 Security Guide
Title | The Lab Guide for Red Hat Enterprise Linux 7 Security Guide PDF eBook |
Author | William Rothwell |
Publisher | |
Pages | 110 |
Release | 2018-05-03 |
Genre | |
ISBN | 9781717580368 |
Reading just isn't enough. Lock in your new Linux Security knowledge with hands-on exercises. Read the content of the official Red Hat(r) Enterprise Linux 7 Security Guide and then perform the labs in this guide. Most people will forget much of what they read, but the changes of you really absorbing new material is greatly enhanced with practical hands-on experience. Unfortunately, most online documentation doesn't include hand-on labs. This Lab Guide is designed to provide you with the experience you need to successfully learn.
Red Hat Linux Security and Optimization
Title | Red Hat Linux Security and Optimization PDF eBook |
Author | Reynaldo Ballard |
Publisher | Createspace Independent Publishing Platform |
Pages | 424 |
Release | 2017-03-07 |
Genre | |
ISBN | 9781548551773 |
Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to apply certain patches to fix a security problem -- but this book shows you how to secure all applications so that the chances for a security breach are automatically minimized. Application performance benchmarking will also be covered. This book introduces you to many application-specific performance and benchmarking techniques and shows you how to tune your computer as well as your networks. This book covers all the primary Red Hat Linux Applications such as Apache Web Server, WuFTP, FTP server, BIND DNS server, Sendmail SMTP server and focuses on how to enhance security for each of them. It also shows you how to secure NFS and Samba Server, as well as the Apache Web Server.