Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization
Title Red Hat Linux Security and Optimization PDF eBook
Author Mohammed J. Kabir
Publisher *Red Hat
Pages 724
Release 2002
Genre Computers
ISBN

Download Red Hat Linux Security and Optimization Book in PDF, Epub and Kindle

CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools.

Red Hat Linux Security

Red Hat Linux Security
Title Red Hat Linux Security PDF eBook
Author George M. Doss
Publisher Wordware Publishing
Pages 340
Release 2000
Genre Computers
ISBN 9781556227738

Download Red Hat Linux Security Book in PDF, Epub and Kindle

Security is increasingly a concern among system administrators, including those using Red Hat Linux. "Learn Red Hat Linux Security" shows experienced system administrators a process for implementing Red Hat Linux into an overall security management system. In addition to a review of the basic computer security issues common to all systems, the book provides an in-depth discussion of security issues concerning major components of the Red Hat Linux filesystem; tools for maintaining security; and advanced security techniques. The appendixes contain definitions for terms and acronyms used in networking and Internet security; Linux security commands; Linux security weaknesses; sites related to security; and listings of networking HOWTOs, networking RFCs, and man pages for networking administration and maintenance. The companion CD-ROM contains the official Red Hat Linux 6.2 operating system for Intel computers. George M. Doss is a technical writer in Dallas, Texas, with over 20 years of experience in the computer and telecommunications fields. His titles with Wordware include "Learn Red Hat Linux OS Tips" and "Learn Red Hat Linux Server Tips".

NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5

NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5
Title NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5 PDF eBook
Author MIDPOINT TRADE BOOKS INC
Publisher Tstc Pub
Pages 200
Release 2009-09-02
Genre Computers
ISBN 9781934302613

Download NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Book in PDF, Epub and Kindle

The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.

Red Hat Linux Networking and System Administration

Red Hat Linux Networking and System Administration
Title Red Hat Linux Networking and System Administration PDF eBook
Author Terry Collings
Publisher *Red Hat
Pages 1012
Release 2004-02-20
Genre Computers
ISBN 9780764544989

Download Red Hat Linux Networking and System Administration Book in PDF, Epub and Kindle

* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools * Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network * Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice * Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).

Enterprise Linux 5

Enterprise Linux 5
Title Enterprise Linux 5 PDF eBook
Author National Security Administration
Publisher Tstc Publishing
Pages 0
Release 2012-03
Genre Linux
ISBN 9781936603084

Download Enterprise Linux 5 Book in PDF, Epub and Kindle

The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions. This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.

The Lab Guide for Red Hat Enterprise Linux 7 Security Guide

The Lab Guide for Red Hat Enterprise Linux 7 Security Guide
Title The Lab Guide for Red Hat Enterprise Linux 7 Security Guide PDF eBook
Author William Rothwell
Publisher
Pages 110
Release 2018-05-03
Genre
ISBN 9781717580368

Download The Lab Guide for Red Hat Enterprise Linux 7 Security Guide Book in PDF, Epub and Kindle

Reading just isn't enough. Lock in your new Linux Security knowledge with hands-on exercises. Read the content of the official Red Hat(r) Enterprise Linux 7 Security Guide and then perform the labs in this guide. Most people will forget much of what they read, but the changes of you really absorbing new material is greatly enhanced with practical hands-on experience. Unfortunately, most online documentation doesn't include hand-on labs. This Lab Guide is designed to provide you with the experience you need to successfully learn.

Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization
Title Red Hat Linux Security and Optimization PDF eBook
Author Reynaldo Ballard
Publisher Createspace Independent Publishing Platform
Pages 424
Release 2017-03-07
Genre
ISBN 9781548551773

Download Red Hat Linux Security and Optimization Book in PDF, Epub and Kindle

Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to apply certain patches to fix a security problem -- but this book shows you how to secure all applications so that the chances for a security breach are automatically minimized. Application performance benchmarking will also be covered. This book introduces you to many application-specific performance and benchmarking techniques and shows you how to tune your computer as well as your networks. This book covers all the primary Red Hat Linux Applications such as Apache Web Server, WuFTP, FTP server, BIND DNS server, Sendmail SMTP server and focuses on how to enhance security for each of them. It also shows you how to secure NFS and Samba Server, as well as the Apache Web Server.