Wednesday, April 13, 2011

Hacking Red Hat Enteprise Linux

Hacking Red Hat Enteprise Linux
Author: Paul Ammann
Edition: 1
Binding: Perfect Paperback
ISBN: 0557163110



Hacking Red Hat Enteprise Linux


This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. Get Hacking Red Hat Enteprise Linux computer books for free.
The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.

Covers Red Hat Enterprise Linux 5 and 6 Install, maintain, and update software Learn how to modify file and directory permissions to prevent unauthorized users Prevent unauthorized people from gaining shell access to accounts, particularly to privileged accounts Master SELinux configuration Configure logging, log monitoring, and audit Check Hacking Red Hat Enteprise Linux our best computer books for 2013. All books are available in pdf format and downloadable from rapidshare, 4shared, and mediafire.

download

Hacking Red Hat Enteprise Linux Download


The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product

Covers Red Hat Enterprise Linux 5 and 6 Install, maintain, and update software Learn how to modify file and directory permissions to prevent unauthorized users Prevent unauthorized people from gaining shell access to accounts, particularly to privileged accounts Master SELinux configuration Configure logging, log monitoring, and audit

Related Computer Books


RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition (Certification Press)


The best fully integrated study system available (Exams EX200 and EX300) With hundreds of review questions and complete coverage of performance-based requirements, RHCSA/RHCE Red Hat Linux Certification Study Guide, Sixth Edition covers what y

UNIX and Linux System Administration Handbook (4th Edition)


"As an author, editor, and publisher, I never paid much attention to the competition-except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against."A

SELinux by Example: Using Security Enhanced Linux


SELinux: Bring World-Class Security to Any Linux Environment! A SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included

Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)


PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is di

Access Control, Authentication, and Public Key Infrastructure (Information Systems Security & Assurance)


PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality,

No comments:

Post a Comment