|
![]() |
|||
|
||||
OverviewThe Guide to the Secure Configuration of Red Hat Enterprise Linux 5 provides security configuration recommendations for the Red Hat Enterprises Linux (RHEL) 5 operating system for system administrators. Readers are assumed to possess basic system administration skills for Unix-like systems, as well as some familiarity with Red Hat's documentation and administration conventions. Full Product DetailsAuthor: Security Administration , National Security AdministrationPublisher: Tstc Publishing Imprint: Tstc Publishing Edition: 2nd Dimensions: Width: 21.60cm , Height: 1.30cm , Length: 1.30cm ISBN: 9781936603084ISBN 10: 193660308 Pages: 200 Publication Date: 01 March 2012 Audience: General/trade , General Format: Paperback Publisher's Status: Out of Print Availability: Available To Order ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |