III. Security Reference
Using secure protocols is a critical part of maintaining system
integrity. This part describes critical tools used for the purpose
of user authentication, network access control, and secure network
communication. For more information about securing a Red Hat
Enterprise Linux system, refer to the Red Hat
Enterprise Linux Security Guide.