The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions. This book is ...
Read More
The Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Features include numerous screenshots, information written for a knowledgeable audience and detailed step-by-step instructions. This book is available separately or bundled together with Introduction to Linux: A Hands-On Guide.
Read Less
Add this copy of Enterprise Linux 5: Top Secret Guide to the Secure to cart. $27.98, very good condition, Sold by SellingTales rated 5.0 out of 5 stars, ships from Belvidere, NJ, UNITED STATES, published 2012 by TSTC Publishing.
Add this copy of Enterprise Linux 5: Top Secret Guide to the Secure to cart. $32.98, like new condition, Sold by SellingTales rated 5.0 out of 5 stars, ships from Belvidere, NJ, UNITED STATES, published 2012 by TSTC Publishing.
Add this copy of Guide to the Secure Configuration of Red Hat Enterprise to cart. $62.34, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2012 by Tstc Pub.