Implementing SSH
John Wiley & Sons Inc (Verlag)
978-0-471-45880-7 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: Explore many remote access solutions, including the theory, setup, and configuration of port forwarding Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding Use SSH on network devices that are traditionally managed by Telnet Utilize SSH as a VPN solution in both a server and client aspect Replace insecure protocols such as Rsh, Rlogin, and FTP Use SSH to secure Web browsing and as a secure wireless (802.11) solution
HIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment.
Acknowledgments. About the Author. Introduction. Part 1: SSH Basics. Chapter 1: Overview of SSH. Chapter 2: SSH Servers. Chapter 3: Secure Shell Clients. Chapter 4: Authentication. Chapter 5: SSH Management. Part 2: Remote Access Solutions. Chapter 6: SSH Port Forwarding. Chapter 7: Secure Remote Access. Part 3: Protocol Replacement. Chapter 8: SSH Versatility. Chapter 9: Proxy Technologies in a secure Web Environment. Chapter 10: SSH Case Studies. Epilogue. Index.
Erscheint lt. Verlag | 31.10.2003 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | New York |
Sprache | englisch |
Maße | 189 x 236 mm |
Gewicht | 595 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-471-45880-5 / 0471458805 |
ISBN-13 | 978-0-471-45880-7 / 9780471458807 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich