III. Security Reference
Using secure protocols is a critical part of maintaining system
integrity. This part describes critical tools used for the purpose of user
authentication, network access control, secure network communication, and
intrusion detection. For more information about securing a Red Hat Linux system,
refer to the Red Hat Linux Security Guide.