Secure Linux Distributions: Three Approaches to Three Different Problems
To actually answer the question properly, I usually need to spend the better part of an hour asking the other person questions: what their requirements are, how much they can spend, what the current installation has, and so on. After getting this information I can usually make a recommendation; sometimes the answer is clear, and other times it isn't too
The link for this article located at Security Portal is no longer available.