April 2016
Beginner to intermediate
276 pages
5h 32m
English
In this chapter, we will discuss the following:
A Linux machine is only as secure as an administrator configures it to be. Once we are done with the installation of the Linux OS and we remove its unnecessary packages after the installation has been completed, we can start working on the security aspect of the software and the services provided by the Linux machine.