Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, Ind. ; [Chichester] : Wiley, c2004.Description: xxvi, 376 p. : illOther title:
  • Implementing secure shell
Subject(s): Genre/Form: DDC classification:
  • 005.8 22
LOC classification:
  • QA76.76.O63 D895 2004eb
Online resources:
Contents:
pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes index.

pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.

Electronic reproduction. Palo Alto, Calif. : ebrary, 2009. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.

There are no comments on this title.

to post a comment.