Al momento non sono disponibili copie per questo codice ISBN.Vedi tutte le copie di questo ISBN:
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.Contenuti:
Preface; Protect Your Network with SSH; Intended Audience; Reading This Book; Our Approach; Which Chapters Are for You?; Supported Platforms; Disclaimers; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: Introduction to SSH; 1.1 What Is SSH?; 1.2 What SSH Is Not; 1.3 The SSH Protocol; 1.4 Overview of SSH Features; 1.5 History of SSH; 1.6 Related Technologies; 1.7 Summary; Chapter 2: Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.3 Adding Complexity to the Example; 2.4 Authentication by Cryptographic Key; 2.5 The SSH Agent; 2.6 Connecting Without a Password or Passphrase; 2.7 Miscellaneous Clients; 2.8 Summary; Chapter 3: Inside SSH; 3.1 Overview of Features; 3.2 A Cryptography Primer; 3.3 The Architecture of an SSH System; 3.4 Inside SSH-1; 3.5 Inside SSH-2; 3.6 As-User Access (userfile); 3.7 Randomness; 3.8 SSH and File Transfers (scp and sftp); 3.9 Algorithms Used by SSH; 3.10 Threats SSH Can Counter; 3.11 Threats SSH Doesn’t Prevent; 3.12 Summary; Chapter 4: Installation and Compile-Time Configuration; 4.1 SSH1 and SSH2; 4.2 F-Secure SSH Server; 4.3 OpenSSH; 4.4 Software Inventory; 4.5 Replacing R-Commands with SSH; 4.6 Summary; Chapter 5: Serverwide Configuration; 5.1 The Name of the Server; 5.2 Running the Server; 5.3 Server Configuration: An Overview; 5.4 Getting Ready: Initial Setup; 5.5 Letting People in: Authentication and Access Control; 5.6 User Logins and Accounts; 5.7 Subsystems; 5.8 History, Logging, and Debugging; 5.9 Compatibility Between SSH-1 and SSH-2 Servers; 5.10 Summary; Chapter 6: Key Management and Agents; 6.1 What Is an Identity?; 6.2 Creating an Identity; 6.3 SSH Agents; 6.4 Multiple Identities; 6.5 Summary; Chapter 7: Advanced Client Use; 7.1 How to Configure Clients; 7.2 Precedence; 7.3 Introduction to Verbose Mode; 7.4 Client Configuration in Depth; 7.5 Secure Copy with scp; 7.6 Summary; Chapter 8: Per-Account Server Configuration; 8.1 Limits of This Technique; 8.2 Public Key-Based Configuration; 8.3 Trusted-Host Access Control; 8.4 The User rc File; 8.5 Summary; Chapter 9: Port Forwarding and X Forwarding; 9.1 What Is Forwarding?; 9.2 Port Forwarding; 9.3 X Forwarding; 9.4 Forwarding Security: TCP-wrappers and libwrap; 9.5 Summary; Chapter 10: A Recommended Setup; 10.1 The Basics; 10.2 Compile-Time Configuration; 10.3 Serverwide Configuration; 10.4 Per-Account Configuration; 10.5 Key Management; 10.6 Client Configuration; 10.7 Remote Home Directories (NFS, AFS); 10.8 Summary; Chapter 11: Case Studies; 11.1 Unattended SSH: Batch or cron Jobs; 11.2 FTP Forwarding; 11.3 Pine, IMAP, and SSH; 11.4 Kerberos and SSH; 11.5 Connecting Through a GatewayHost; Chapter 12: Troubleshooting and FAQ; 12.1 Debug Messages: Your First Line of Defense; 12.2 Problems and Solutions; 12.3 Other SSH Resources; 12.4 Reporting Bugs; Chapter 13: Overview of Other Implementations; 13.1 Common Features; 13.2 Covered Products; 13.3 Table of Products; 13.4 Other SSH-Related Products; Chapter 14: SSH1 Port by Sergey Okhapkin (Windows); 14.1 Obtaining and Installing Clients; 14.2 Client Use; 14.3 Obtaining and Installing the Server; 14.4 Troubleshooting; 14.5 Summary; Chapter 15: SecureCRT (Windows); 15.1 Obtaining and Installing; 15.2 Basic Client Use; 15.3 Key Management; 15.4 Advanced Client Use; 15.5 Forwarding; 15.6 Troubleshooting; 15.7 Summary; Chapter 16: F-Secure SSH Client (Windows, Macintosh); 16.1 Obtaining and Installing; 16.2 Basic Client Use; 16.3 Key Management; 16.4 Advanced Client Use; 16.5 Forwarding; 16.6 Troubleshooting; 16.7 Summary; Chapter 17: NiftyTelnet SSH (Macintosh); 17.1 Obtaining and Installing; 17.2 Basic Client Use; 17.3 Troubleshooting; 17.4 Summary; SSH2 Manpage for sshregex; SSH Quick Reference; Legend; sshd Options; sshd Keywords; ssh and scp Keywords; ssh Options; scp Options; ssh-keygen Options; ssh-agent Options; ssh-add Options; Identity and Authorization Files; Environment Variables; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Descrizione libro Condizione: New. A+ Customer service! Satisfaction Guaranteed! Book is in NEW condition. Codice articolo 0596000111-2-1
Descrizione libro Paperback. Condizione: New. Codice articolo DADAX0596000111
Descrizione libro Condizione: New. book. Codice articolo M0596000111
Descrizione libro Condizione: New. New. Codice articolo Q-0596000111