000 01689nam a2200361Ia 4500
001 0000082899
005 20171002054149.0
006 m u
007 cr cn|||||||||
008 040302s2004 inua s 001 0 eng d
010 _z 2004297174
020 _z0471458805 (pbk)
035 _a(CaPaEBR)ebr10114250
035 _a(OCoLC)133168806
040 _aCaPaEBR
_cCaPaEBR
050 1 4 _aQA76.76.O63
_bD895 2004eb
082 0 4 _a005.8
_222
100 1 _aDwivedi, Himanshu.
245 1 0 _aImplementing SSH
_h[electronic resource] :
_bstrategies for optimizing the Secure Shell /
_cHimanshu Dwivedi.
246 3 _aImplementing secure shell
260 _aIndianapolis, Ind. ;
_a[Chichester] :
_bWiley,
_cc2004.
300 _axxvi, 376 p. :
_bill.
500 _aIncludes index.
505 0 _apt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
533 _aElectronic reproduction.
_bPalo Alto, Calif. :
_cebrary,
_d2009.
_nAvailable via World Wide Web.
_nAccess may be limited to ebrary affiliated libraries.
630 0 0 _aUNIX Shells.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData encryption (Computer science)
655 7 _aElectronic books.
_2local
710 2 _aebrary, Inc.
856 4 0 _uhttp://site.ebrary.com/lib/daystar/Doc?id=10114250
_zAn electronic book accessible through the World Wide Web; click to view
908 _a170314
942 0 0 _cEB
999 _c72057
_d72057