The purpose of this book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment. This book is intended for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Some instructions within this guide are complex. All directions should be followed completely and with understanding of their effects in order to avoid serious adverse effects on the system and its security.
發表於2024-11-20
Hacking Red Hat Enteprise Linux 2024 pdf epub mobi 電子書 下載
圖書標籤:
Hacking Red Hat Enteprise Linux 2024 pdf epub mobi 電子書 下載