Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat Security Administration

ISBN: 9781936603084

Published: March 1st 2012

Paperback

200 pages


Description

Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat  by  Security Administration

Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat by Security Administration
March 1st 2012 | Paperback | PDF, EPUB, FB2, DjVu, AUDIO, mp3, RTF | 200 pages | ISBN: 9781936603084 | 3.58 Mb

The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic systemMoreThe Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators.

Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hats documentation and administration conventions.Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions.This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.



Enter the sum





Related Archive Books



Related Books


Comments

Comments for "Enterprise Linux 5: Top Secret Guide to the Secure Configuration of Red Hat":


eastgreatsmokymountainsparkway.com

©2009-2015 | DMCA | Contact us