We're aiming this book at Linux administrators in general, whether or not they specialize in Linux security. The techniques that we present can be used on either Linux servers or on Linux workstations.
We assume that our target audience has had some hands-on experience with the Linux command line, and has the basic knowledge of Linux Essentials.