This title looks at the pros and cons of open source security tools and demonstrates how to implement them. It also provides coverage of Bastille. The text includes detailed instructions, as well as essential background information.An excellent resource is the LILO Usera#39;s Guide which may be found in /usr/ doc/ lilo*. ... it is likely because the howto-5.2- 2.src.rpm (Red Hat 5.2) or howto-6.0-4. src.rpm (Red Hat 6.0) packages (see Red Hat Package Manager on page 26 for anbsp;...
Title | : | Linux System Security |
Author | : | Scott Mann, Ellen L. Mitchell |
Publisher | : | Prentice Hall Professional - 2000 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: