Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.Contenuti:
Preface; Protect Your Network with SSH; Intended Audience; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.4 Overview of SSH Features; 1.5 History of SSH; 1.6 Related Technologies; 1.7 Summary; Chapter 2: Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.3 Adding Complexity to the Example; 2.4 Authentication by Cryptographic Key; 2.5 The SSH Agent; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.8 Summary; Chapter 3: Inside SSH; 3.1 Overview of Features; 3.2 A Cryptography Primer; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-1; 3.5 Inside SSH-2; 3.6 As-User Access (userfile); 3.7 Randomness; 3.8 SSH and File Transfers (scp and sftp); 3.9 Algorithms Used by SSH; 3.10 Threats SSH Can Counter; 3.11 Threats SSH Doesn’t Prevent; 3.12 Summary; Chapter 4: Installation and Compile-Time Configuration; 4.1 SSH1 and SSH2; 4.2 F-Secure SSH Server; 4.3 OpenSSH; 4.4 Software Inventory; 4.5 Replacing R-Commands with SSH; 4.6 Summary; Chapter 5: Serverwide Configuration; 5.1 The Name of the Server; 5.2 Running the Server; 5.3 Server Configuration: An Overview; 5.4 Getting Ready: Initial Setup; 5.5 Letting People in: Authentication and Access Control; 5.6 User Logins and Accounts; 5.7 Subsystems; 5.8 History, Logging, and Debugging; 5.9 Compatibility Between SSH-1 and SSH-2 Servers; 5.10 Summary; Chapter 6: Key Management and Agents; 6.1 What Is an Identity?; 6.2 Creating an Identity; 6.3 SSH Agents; 6.4 Multiple Identities; 6.5 Summary; Chapter 7: Advanced Client Use; 7.1 How to Configure Clients; 7.2 Precedence; 7.3 Introduction to Verbose Mode; 7.4 Client Configuration in Depth; 7.5 Secure Copy with scp; 7.6 Summary; Chapter 8: Per-Account Server Configuration; 8.1 Limits of This Technique; 8.2 Public Key-Based Configuration; 8.3 Trusted-Host Access Control; 8.4 The User rc File; 8.5 Summary; Chapter 9: Port Forwarding and X Forwarding; 9.1 What Is Forwarding?; 9.2 Port Forwarding; 9.3 X Forwarding; 9.4 Forwarding Security: TCP-wrappers and libwrap; 9.5 Summary; Chapter 10: A Recommended Setup; 10.1 The Basics; 10.2 Compile-Time Configuration; 10.3 Serverwide Configuration; 10.4 Per-Account Configuration; 10.5 Key Management; 10.6 Client Configuration; 10.7 Remote Home Directories (NFS, AFS); 10.8 Summary; Chapter 11: Case Studies; 11.1 Unattended SSH: Batch or cron Jobs; 11.2 FTP Forwarding; 11.3 Pine, IMAP, and SSH; 11.4 Kerberos and SSH; 11.5 Connecting Through a GatewayHost; Chapter 12: Troubleshooting and FAQ; 12.1 Debug Messages: Your First Line of Defense; 12.2 Problems and Solutions; 12.3 Other SSH Resources; 12.4 Reporting Bugs; Chapter 13: Overview of Other Implementations; 13.1 Common Features; 13.2 Covered Products; 13.3 Table of Products; 13.4 Other SSH-Related Products; Chapter 14: SSH1 Port by Sergey Okhapkin (Windows); 14.1 Obtaining and Installing Clients; 14.2 Client Use; 14.3 Obtaining and Installing the Server; 14.4 Troubleshooting; 14.5 Summary; Chapter 15: SecureCRT (Windows); 15.1 Obtaining and Installing; 15.2 Basic Client Use; 15.3 Key Management; 15.4 Advanced Client Use; 15.5 Forwarding; 15.6 Troubleshooting; 15.7 Summary; Chapter 16: F-Secure SSH Client (Windows, Macintosh); 16.1 Obtaining and Installing; 16.2 Basic Client Use; 16.3 Key Management; 16.4 Advanced Client Use; 16.5 Forwarding; 16.6 Troubleshooting; 16.7 Summary; Chapter 17: NiftyTelnet SSH (Macintosh); 17.1 Obtaining and Installing; 17.2 Basic Client Use; 17.3 Troubleshooting; 17.4 Summary; SSH2 Manpage for sshregex; SSH Quick Reference; Legend; sshd Options; sshd Keywords; ssh and scp Keywords; ssh Options; scp Options; ssh-keygen Options; ssh-agent Options; ssh-add Options; Identity and Authorization Files; Environment Variables; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Descrizione libro O'Reilly Media. PAPERBACK. Condizione libro: New. 0596000111. Codice libro della libreria CUD1421.1AFVW040116H0372A
Descrizione libro O'Reilly Media, 2001. Paperback. Condizione libro: New. 1st. Codice libro della libreria DADAX0596000111
Descrizione libro O'Reilly Media, 2001. Condizione libro: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: This guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of basic to advanced use of SSH client tools for UNIX, Windows and Macintosh. Codice libro della libreria ABE_book_new_0596000111
Descrizione libro Condizione libro: Brand New. Book Condition: Brand New. Codice libro della libreria 97805960001101.0
Descrizione libro O'Reilly Media, 2001. Paperback. Condizione libro: New. book. Codice libro della libreria 0596000111
Descrizione libro O'Reilly Media, 2001. Paperback. Condizione libro: New. FAST SHIPPING & FREE TRACKING! 100% Money Back Guaranteed. The pages of this book are clean and unmarked. There is very little shelf wear. The spine is solid and the binding is tight. Codice libro della libreria 132582
Descrizione libro O'reilly & Associates, 2001. Taschenbuch. Condizione libro: Neu. Gebraucht - Wie neu Unbenutzt. Schnelle Lieferung, Kartonverpackung. Abzugsfähige Rechnung. Bei Mehrfachbestellung werden die Versandkosten anteilig erstattet. - Sehr guter Zustand, - UNBENUTZT - Schnelle Lieferung, abzugsfähige Rechnung liegt bei 550 pp. Deutsch. Codice libro della libreria INF1000037491
Descrizione libro O'Reilly Media, 2001. Paperback. Condizione libro: New. Codice libro della libreria P110596000111
Descrizione libro O'Reilly Media. PAPERBACK. Condizione libro: New. 0596000111 New Condition. Codice libro della libreria NEW4.0310491
Descrizione libro O'Reilly Media, Incorporated. Condizione libro: New. pp. 540. Codice libro della libreria 7571322