Red Hat Enterprise Linux 7 Security Guide
β Scribed by PrpiΔ M., Δapek T., Wadeley S.
- Tongue
- English
- Leaves
- 198
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
A Guide to Securing Red Hat Enterprise Linux 7
This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation, and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.
β¦ Subjects
ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ°;ΠΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΠ°;Linux / Unix;CentOS / Red Hat Enterprise Linux
π SIMILAR VOLUMES
Securing your virtual environment<br/>T his guide provides an overview of virtualization security technologies provided by Red Hat. It also<br/>provides recommendations for securing hosts, guests, and shared infrastructure and resources in<br/>virtualized environments.
An introduction to application development tools in Red Hat Enterprise<br/>Linux 7<br/>T his document describes the different features and utilities that make Red Hat Enterprise Linux 7 an<br/>ideal enterprise platform for application development. It focuses on Eclipse as an end-to-end integrated de
Configuration and Administration of networking for Red Hat Enterprise Linux 7<br/>The Red Hat Enterprise Linux 7 Networking Guide documents relevant information regarding the configuration and administration of network interfaces, networks and network services in Red Hat Enterprise Linux<br/>7. It i