Chapter 1: Distributions and Key Components
Chapter 2: Working on the Command Line
Chapter 5: When Things Go Wrong
The Science of Troubleshooting
Part II: User and Group Accounts
Chapter 6: Managing Group Accounts
Chapter 7: Managing User Accounts
The Importance of User Accounts
Chapter 8: Develop an Account Security Policy
Part III: File and Data Storage
Chapter 10: Manage Local Storage: Essentials
Chapter 11: Manage Local Storage: Advanced Features
Chapter 12: Manage Network Storage
Chapter 13: Develop a Storage Security Policy
Chapter 16: Common Automation Tasks
Exploring Scripts that Already Exist on Your System
Creating Your Own Automation Scripts
Chapter 17: Develop an Automation Security Policy
Chapter 19: Network Configuration
Persistent Network Configurations
Network Troubleshooting Commands
Chapter 20: Network Service Configuration: Essential Services
Chapter 21: Network Service Configuration: Web Services
Basic Apache Web Server Configuration
Chapter 22: Connecting to Remote Systems
Chapter 23: Develop a Network Security Policy
Part VI: Process and Log Administration
Chapter 26: Red Hat–Based Software Management
Chapter 27: Debian-Based Software Management
Listing Package Information with APT Commands
Chapter 29: Develop a Software Management Security Policy
Essentials of the iptables Command
Using iptables to Filter Incoming Packets
Using iptables to Filter Outgoing Packets
Chapter 32: Intrusion Detection
Introduction to Intrusion Detection Tools
Intrusion Detection Network Tools
Intrusion Detection File Tools
Additional Intrusion Detection Tools
Chapter 33: Additional Security Tasks