Implementing SSH: Strategies For Optimizing The Secure Shell.
A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your ne...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
Wiley Publishing
2011
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-26358 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-263582012-03-03T05:13:35Z Implementing SSH: Strategies For Optimizing The Secure Shell. Dwivedi, Himanshu Tin học A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solution 2011-10-31T08:22:32Z 2011-10-31T08:22:32Z 2004 Book 0-471-45880-5 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358 en application/pdf Wiley Publishing |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
topic |
Tin học |
spellingShingle |
Tin học Dwivedi, Himanshu Implementing SSH: Strategies For Optimizing The Secure Shell. |
description |
A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network
Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients.
With the help of numerous architectural examples and case studies, you'll gain the necessary skills to:
* Explore many remote access solutions, including the theory, setup, and configuration of port forwarding
* Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding
* Use SSH on network devices that are traditionally managed by Telnet
* Utilize SSH as a VPN solution in both a server and client aspect
* Replace insecure protocols such as Rsh, Rlogin, and FTP
* Use SSH to secure Web browsing and as a secure wireless (802.11) solution |
format |
Book |
author |
Dwivedi, Himanshu |
author_facet |
Dwivedi, Himanshu |
author_sort |
Dwivedi, Himanshu |
title |
Implementing SSH: Strategies For Optimizing The Secure Shell. |
title_short |
Implementing SSH: Strategies For Optimizing The Secure Shell. |
title_full |
Implementing SSH: Strategies For Optimizing The Secure Shell. |
title_fullStr |
Implementing SSH: Strategies For Optimizing The Secure Shell. |
title_full_unstemmed |
Implementing SSH: Strategies For Optimizing The Secure Shell. |
title_sort |
implementing ssh: strategies for optimizing the secure shell. |
publisher |
Wiley Publishing |
publishDate |
2011 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26358 |
_version_ |
1757663883302010880 |