Tuesday, December 6, 2011

Hacking Red Hat Linux

Hacking Red Hat Linux Review



This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.


No comments:

Post a Comment