This title looks at the pros and cons of open source security tools and demonstrates how to implement them. It also provides coverage of Bastille. The text includes detailed instructions, as well as essential background information.... through a modem. We will look at managing the log messages and log files in detail in Chapter 17. ... In other words, what messages do you want, how do you want them processed, and how quickly do you want them? As you read through the remainder of this book, exactly what you want will become clearer. As you workanbsp;...
|Title||:||Linux System Security|
|Author||:||Scott Mann, Ellen L. Mitchell|
|Publisher||:||Prentice Hall Professional - 2000|