The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Read More
The purpose of the Guide to the Secure Configuration of Red Hat Enterprise Linux 5 is to provide security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions.
Read Less
Add this copy of Guide to the Secure Configuration of Red Hat Enterprise to cart. $97.75, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Newport Coast, CA, UNITED STATES, published 2009 by Tstc Pub.