II. Configuring Red Hat Linux for Security

This part informs and instructs administrators on the proper techniques and tools to use when securing Red Hat Linux workstations, Red Hat Linux servers, and network resources. It also discusses how to make secure connections, lock down ports and services, and implement active filtering to prevent network intrusion.