Implementing SSH - Strategies for Optimizing the Secure Shell (Electronic book text)


The first book that concentrates on how to use SSH (Secure Shell), a security protocol, in the real world Takes a close look at running SSH in virtually all operating systems, desktops, and servers, and how its potential is just starting to emerge Covers how to use SSH with other management tools to protect against network attacks like IP spoofing, IP source routing, and DNS spoofing Shows how to use SSH as a replacement for other insecure tools, such as using secure file transfer to replace FTP Demonstrates how to use SSH as a VPN solution, in both a server and cli-ent aspect

Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

The first book that concentrates on how to use SSH (Secure Shell), a security protocol, in the real world Takes a close look at running SSH in virtually all operating systems, desktops, and servers, and how its potential is just starting to emerge Covers how to use SSH with other management tools to protect against network attacks like IP spoofing, IP source routing, and DNS spoofing Shows how to use SSH as a replacement for other insecure tools, such as using secure file transfer to replace FTP Demonstrates how to use SSH as a VPN solution, in both a server and cli-ent aspect

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

John Wiley & Sons

Country of origin

United States

Release date

October 2003

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

Authors

Format

Electronic book text

Pages

404

ISBN-13

978-6610351787

Barcode

9786610351787

Categories

LSN

6610351783



Trending On Loot