Abstract

You've been introduced to some of the major features of CentOS from its installation up to managing user accounts. It is now time to look at how you can manage your system's security by imposing restrictions and browsing important files that CentOS uses to keep you, the administrator, up to speed. This can be done using logs and modules that can enhance the security of your system. Once you get the hang of logs and modules, you can also use CentOS's task automation facility to run commands that you may often use.

Keywords:
Computer science Task (project management) Hang Computer security System administrator Automation Operating system World Wide Web Engineering Systems engineering

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.07
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Distributed and Parallel Computing Systems
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Basic Security Mechanisms in Linux

N. LimanovaA. Anashkin

Journal:   Bulletin of Science and Practice Year: 2024 Vol: 10 (2)Pages: 404-406
JOURNAL ARTICLE

Linux security

Gustavo AmarchandPatrick BrownThomas A. Mahoney

Journal:   Advances in Engineering Innovation Year: 2023 Vol: 2 (1)Pages: 17-20
BOOK-CHAPTER

Linux Basic Administration

Brendan Choi

Apress eBooks Year: 2021 Pages: 329-365
BOOK-CHAPTER

Basic Linux Commands

James Barnett

Apress eBooks Year: 2015 Pages: 331-332
JOURNAL ARTICLE

Security Enhanced Linux

Kunz, Oliver

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2014
© 2026 ScienceGate Book Chapters — All rights reserved.