SSH (Secure Shell) is a TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunnelling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. This text covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of: SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products - the basics, the internals, and complex applications; configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security; advanced key management using agents, agent forwarding, and forced commands; forwarding (tunnelling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT); undocumented behaviours of popular SSH implementations; installing and maintaining SSH systems; and troubleshooting a wide variety of common and not-so-common problems. Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.
Preface; Protect Your Network with SSH; Intended Audience; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.4 Overview of SSH Features; 1.5 History of SSH; 1.6 Related Technologies; 1.7 Summary; Chapter 2: Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.3 Adding Complexity to the Example; 2.4 Authentication by Cryptographic Key; 2.5 The SSH Agent; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.8 Summary; Chapter 3: Inside SSH; 3.1 Overview of Features; 3.2 A Cryptography Primer; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-1; 3.5 Inside SSH-2; 3.6 As-User Access (userfile); 3.7 Randomness; 3.8 SSH and File Transfers (scp and sftp); 3.9 Algorithms Used by SSH; 3.10 Threats SSH Can Counter; 3.11 Threats SSH Doesn’t Prevent; 3.12 Summary; Chapter 4: Installation and Compile-Time Configuration; 4.1 SSH1 and SSH2; 4.2 F-Secure SSH Server; 4.3 OpenSSH; 4.4 Software Inventory; 4.5 Replacing R-Commands with SSH; 4.6 Summary; Chapter 5: Serverwide Configuration; 5.1 The Name of the Server; 5.2 Running the Server; 5.3 Server Configuration: An Overview; 5.4 Getting Ready: Initial Setup; 5.5 Letting People in: Authentication and Access Control; 5.6 User Logins and Accounts; 5.7 Subsystems; 5.8 History, Logging, and Debugging; 5.9 Compatibility Between SSH-1 and SSH-2 Servers; 5.10 Summary; Chapter 6: Key Management and Agents; 6.1 What Is an Identity?; 6.2 Creating an Identity; 6.3 SSH Agents; 6.4 Multiple Identities; 6.5 Summary; Chapter 7: Advanced Client Use; 7.1 How to Configure Clients; 7.2 Precedence; 7.3 Introduction to Verbose Mode; 7.4 Client Configuration in Depth; 7.5 Secure Copy with scp; 7.6 Summary; Chapter 8: Per-Account Server Configuration; 8.1 Limits of This Technique; 8.2 Public Key-Based Configuration; 8.3 Trusted-Host Access Control; 8.4 The User rc File; 8.5 Summary; Chapter 9: Port Forwarding and X Forwarding; 9.1 What Is Forwarding?; 9.2 Port Forwarding; 9.3 X Forwarding; 9.4 Forwarding Security: TCP-wrappers and libwrap; 9.5 Summary; Chapter 10: A Recommended Setup; 10.1 The Basics; 10.2 Compile-Time Configuration; 10.3 Serverwide Configuration; 10.4 Per-Account Configuration; 10.5 Key Management; 10.6 Client Configuration; 10.7 Remote Home Directories (NFS, AFS); 10.8 Summary; Chapter 11: Case Studies; 11.1 Unattended SSH: Batch or cron Jobs; 11.2 FTP Forwarding; 11.3 Pine, IMAP, and SSH; 11.4 Kerberos and SSH; 11.5 Connecting Through a GatewayHost; Chapter 12: Troubleshooting and FAQ; 12.1 Debug Messages: Your First Line of Defense; 12.2 Problems and Solutions; 12.3 Other SSH Resources; 12.4 Reporting Bugs; Chapter 13: Overview of Other Implementations; 13.1 Common Features; 13.2 Covered Products; 13.3 Table of Products; 13.4 Other SSH-Related Products; Chapter 14: SSH1 Port by Sergey Okhapkin (Windows); 14.1 Obtaining and Installing Clients; 14.2 Client Use; 14.3 Obtaining and Installing the Server; 14.4 Troubleshooting; 14.5 Summary; Chapter 15: SecureCRT (Windows); 15.1 Obtaining and Installing; 15.2 Basic Client Use; 15.3 Key Management; 15.4 Advanced Client Use; 15.5 Forwarding; 15.6 Troubleshooting; 15.7 Summary; Chapter 16: F-Secure SSH Client (Windows, Macintosh); 16.1 Obtaining and Installing; 16.2 Basic Client Use; 16.3 Key Management; 16.4 Advanced Client Use; 16.5 Forwarding; 16.6 Troubleshooting; 16.7 Summary; Chapter 17: NiftyTelnet SSH (Macintosh); 17.1 Obtaining and Installing; 17.2 Basic Client Use; 17.3 Troubleshooting; 17.4 Summary; SSH2 Manpage for sshregex; SSH Quick Reference; Legend; sshd Options; sshd Keywords; ssh and scp Keywords; ssh Options; scp Options; ssh-keygen Options; ssh-agent Options; ssh-add Options; Identity and Authorization Files; Environment Variables; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 4,00 per la spedizione da Germania a Italia
Destinazione, tempi e costiEUR 26,33 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: medimops, Berlin, Germania
Condizione: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Codice articolo M00596000111-G
Quantità: 2 disponibili
Da: medimops, Berlin, Germania
Condizione: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Codice articolo M00596000111-V
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Good. 1st Edition. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo GRP18681273
Quantità: 1 disponibili
Da: LeLivreVert, Eysines, Francia
Condizione: good. Photo non contractuelle. Envoi rapide et soigné. Codice articolo 9780596000110_2986_ZA209
Quantità: 1 disponibili
Da: Bahamut Media, Reading, Regno Unito
Condizione: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Codice articolo 6545-9780596000110
Quantità: 2 disponibili
Da: AwesomeBooks, Wallingford, Regno Unito
Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Codice articolo 7719-9780596000110
Quantità: 2 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. SSH (Secure Shell) is a TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunnelling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. This text covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of: SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products - the basics, the internals, and complex applications; configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security; advanced key management using agents, agent forwarding, and forced commands; forwarding (tunnelling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT); undocumented behaviours of popular SSH implementations; installing and maintaining SSH systems; and troubleshooting a wide variety of common and not-so-common problems. Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR001301240
Quantità: 3 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596000111I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Reno, Reno, NV, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596000111I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2. Codice articolo G0596000111I3N00
Quantità: 1 disponibili