Download the Free Red Hat White Paper "Using an Open Source Framework to Catch the Bad Guy"
Built-in forensics, incident response, and security with Red Hat Enterprise Linux 6
Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment. Traditionally, providing security for a system focuses on the confidentiality of the information on it. However, protecting the data integrity and system and data availability is just as important. For example, when processing United States intelligence information, there are three attributes that require protection: confidentiality, integrity, and availability.
Learn more about catching the bad guy in this free white paper.
Red Hat Federal Solutions Architect team
By: Norman Mark St. Laurent, Senior solutions architect
Editing and technical guidance: Shawn Wells, Technical director
Steve Grubb, Red Hat security lead
Sponsor: DLT Solutions
USE OF INFORMATION: The entry information you provide may be used by Linux Journal and the sponsor to send you information about their respective products and special promotions, but will otherwise not be released to third parties.
- Encrypt Your Dog (Mutt and GPG)
- Practical Tiny Core in the Fire Service
- Cooking with Linux - Serious Cool, Sysadmin Style!
- DevOps for Dummies
- New Products
- Is the Private Cloud a Real Cloud?
- Python Scripts as a Replacement for Bash Utility Scripts
- Open Axiom
- Returning Values from Bash Functions
- Tech Tip: Really Simple HTTP Server with Python
Free DevOps eBooks, Videos, and more!
Regardless of where you are in your DevOps process, Linux Journal can help!
We offer here the DEFINITIVE DevOps for Dummies, a mobile Application Development Primer, and advice & help from the expert sources like:
- Linux Journal