000 | 01689nam a2200361Ia 4500 | ||
---|---|---|---|
001 | 0000082899 | ||
005 | 20171002054149.0 | ||
006 | m u | ||
007 | cr cn||||||||| | ||
008 | 040302s2004 inua s 001 0 eng d | ||
010 | _z 2004297174 | ||
020 | _z0471458805 (pbk) | ||
035 | _a(CaPaEBR)ebr10114250 | ||
035 | _a(OCoLC)133168806 | ||
040 |
_aCaPaEBR _cCaPaEBR |
||
050 | 1 | 4 |
_aQA76.76.O63 _bD895 2004eb |
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 | _aDwivedi, Himanshu. | |
245 | 1 | 0 |
_aImplementing SSH _h[electronic resource] : _bstrategies for optimizing the Secure Shell / _cHimanshu Dwivedi. |
246 | 3 | _aImplementing secure shell | |
260 |
_aIndianapolis, Ind. ; _a[Chichester] : _bWiley, _cc2004. |
||
300 |
_axxvi, 376 p. : _bill. |
||
500 | _aIncludes index. | ||
505 | 0 | _apt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies. | |
533 |
_aElectronic reproduction. _bPalo Alto, Calif. : _cebrary, _d2009. _nAvailable via World Wide Web. _nAccess may be limited to ebrary affiliated libraries. |
||
630 | 0 | 0 | _aUNIX Shells. |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData encryption (Computer science) | |
655 | 7 |
_aElectronic books. _2local |
|
710 | 2 | _aebrary, Inc. | |
856 | 4 | 0 |
_uhttp://site.ebrary.com/lib/daystar/Doc?id=10114250 _zAn electronic book accessible through the World Wide Web; click to view |
908 | _a170314 | ||
942 | 0 | 0 | _cEB |
999 |
_c72057 _d72057 |