SSH, The Secure Shell: The Definitive Guide (Classique Us)

3,69 durchschnittliche Bewertung
( 93 Bewertungen bei GoodReads )
 
9780596000110: SSH, The Secure Shell: The Definitive Guide (Classique Us)
Rezension:

'This book is a must for any person who uses the Internet for communicating with remote servers.' news@UK, October 2001, reviewed by Virantha Mendis '... probably one of the most useful books I have come across in the last twelve months. It contains all the detail I required to set up a secure infrastructure for auditing the server installations we have in the organization. We, as a team, are now working on using SCP rather than FTP to manage Oracle archive log shipping between sites for standby databases, and when I dial into the office from home, SSH gives me a more secure route into the servers than telnet ever did. The most telling fact is that I had a terrible job getting the book back from my colleagues to review. If you are looking to secure your network, or just want to find out more about secure transports, then this is the book to buy. Now if I can only find out who's got it now...? - Peter Scott, http://firstmonday.org/issue7_4/reviews

Vom Verlag:

Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

  • SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.
  • Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.
  • Advanced key management using agents, agent forwarding, and forced commands.
  • Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).
  • Undocumented behaviors of popular SSH implementations.
  • Installing and maintaining SSH systems.

Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

(Keine Angebote verfügbar)

Buch Finden:



Kaufgesuch aufgeben

Sie kennen Autor und Titel des Buches und finden es trotzdem nicht auf ZVAB? Dann geben Sie einen Suchauftrag auf und wir informieren Sie automatisch, sobald das Buch verfügbar ist!

Kaufgesuch aufgeben