This title assists users and administrators in learning the processes and practices of securing
workstations and servers against local and remote intrusion, exploitation, and malicious activity.
Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux
systems, this guide details the planning and the tools involved in creating a secured computing
environment for the data center, workplace, and home. With proper administrative knowledge,
vigilance, and tools, systems running Linux can be both fully functional and secured from most
common intrusion and exploit methods.


There are no reviews yet.

Be the first to review “Red Hat Enterprise Linux 8 Security...”

Your email address will not be published.


Lost your password?

Create an account?


Your cart is currently empty.