Chapter 2 Secure Installation and Configuration

This chapter outlines the planning process for a secure installation and describes how the choices that you make during installation affect system security.