Red Hat Enterprise Linux 6 Security Guide

by Mirek Jahoda, Robert Krátký, Martin Prpič, Tomáš Čapek Stephen Wadeley Yoana Ruseva Miroslav Svoboda
Sept. 9, 2017 1 comment access.redhat.com Pen Testing & Audits

This book assists users and administrators in learning the processes and practices of securing workstations and servers against local and remote intrusion, exploitation and malicious activity. Focused on Red Hat Enterprise Linux but detailing concepts and techniques valid for all Linux systems, this guide details the planning and the tools involved in creating a secured computing environment for the data center, workplace, and home. With proper administrative knowledge, vigilance, and tools, systems running Linux can be both fully functional and secured from most common intrusion and exploit methods.

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/pdf/security_guide/red_h...

Avatar
Steven Ulm 2 months, 3 weeks ago

Great security guide for people studying Cyber Security! Thanks for the upload!

Reply