The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Read More
The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Read Less
Add this copy of Nsa Guide to the Secure Configuration of Red Hat to cart. $42.96, good condition, Sold by HPB-Red rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2009 by TSTC Publishing.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Add this copy of Guide to the Secure Configuration of Red Hat Enterprise to cart. $97.75, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2009 by Tstc Pub.