II. Configuring Red Hat Enterprise Linux for Security
This part informs and instructs administrators on proper techniques
and tools to use when securing Red Hat Enterprise Linux workstations, Red Hat Enterprise Linux servers, and
network resources. It also discusses how to make secure connections, lock
down ports and services, and implement active filtering to prevent network
intrusion.