Implementing SSH: Strategies For Optimizing The Secure Shell.

A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your ne...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Dwivedi, Himanshu
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: Wiley Publishing 2011
Những chủ đề:
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-26358
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-263582012-03-03T05:13:35Z Implementing SSH: Strategies For Optimizing The Secure Shell. Dwivedi, Himanshu Tin học A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solution 2011-10-31T08:22:32Z 2011-10-31T08:22:32Z 2004 Book 0-471-45880-5 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358 en application/pdf Wiley Publishing
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
topic Tin học
spellingShingle Tin học
Dwivedi, Himanshu
Implementing SSH: Strategies For Optimizing The Secure Shell.
description A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solution
format Book
author Dwivedi, Himanshu
author_facet Dwivedi, Himanshu
author_sort Dwivedi, Himanshu
title Implementing SSH: Strategies For Optimizing The Secure Shell.
title_short Implementing SSH: Strategies For Optimizing The Secure Shell.
title_full Implementing SSH: Strategies For Optimizing The Secure Shell.
title_fullStr Implementing SSH: Strategies For Optimizing The Secure Shell.
title_full_unstemmed Implementing SSH: Strategies For Optimizing The Secure Shell.
title_sort implementing ssh: strategies for optimizing the secure shell.
publisher Wiley Publishing
publishDate 2011
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358
_version_ 1757663883302010880