Chapter 1: Distributions and Key Components
Chapter 2: Working on the Command Line
Chapter 5: When Things Go Wrong
Part II: User and Group Accounts
Chapter 6: Managing Group Accounts
Chapter 7: Managing User Accounts
Chapter 8: Develop an Account Security Policy
Part III: File and Data Storage
Chapter 10: Manage Local Storage: Essentials
Chapter 11: Manage Local Storage: Advanced Features
Chapter 12: Manage Network Storage
Chapter 13: Develop a Storage Security Policy
Chapter 16: Common Automation Tasks
Chapter 17: Develop an Automation Security Policy
Chapter 19: Network Configuration
Chapter 20: Network Service Configuration: Essential Services
Chapter 21: Network Service Configuration: Web Services
Chapter 22: Connecting to Remote Systems
Chapter 23: Develop a Network Security Policy
Part VI: Process and Log Administration
Chapter 26: Red Hat–Based Software Management
Chapter 27: Debian-based Software Management
Chapter 29: Develop a Software Management Security Policy
Chapter 32: Intrusion Detection Systems
Chapter 33: Additional Security Tasks
Appendix A: Answers to Review Questions
Index