II. Configuring Red Hat Enterprise Linux for
Security
This part informs and instructs administrators on proper
techniques and tools to use when securing Red Hat Enterprise Linux
workstations, Red Hat Enterprise Linux servers, and network
resources. It also discusses how to make secure connections, lock
down ports and services, and implement active filtering to prevent
network intrusion.