New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book offers the most up-to-date information on SSH version 2 (which replaced the previous version in 2006) in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It incorporates the latest information and is accompanied by companion Website that contains useful scripts and utilities, providing administrators with the newest ways to incorporate this most useful utility into their network tool box.…mehr
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book offers the most up-to-date information on SSH version 2 (which replaced the previous version in 2006) in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It incorporates the latest information and is accompanied by companion Website that contains useful scripts and utilities, providing administrators with the newest ways to incorporate this most useful utility into their network tool box.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.
Inhaltsangabe
Acknowledgments Chapter 1: Introduction Chapter 2: OSI Model and Then Some Chapter 3: An Introduction to Cryptography Chapter 4: SSH Features Chapter 5: SSH Shortcomings Chapter 6: SSH Client Basics Chapter 7: The SSH Server Basics Chapter 8: SSH on Windows Chapter 9: Linux SSH Chapter 10: Mac SSH Chapter 11: SSH Command Line and Advanced Client Use Chapter 12: SSH Server Advanced Use Chapter 13: SSH Port Forwarding Index
Acknowledgments Chapter 1: Introduction Chapter 2: OSI Model and Then Some Chapter 3: An Introduction to Cryptography Chapter 4: SSH Features Chapter 5: SSH Shortcomings Chapter 6: SSH Client Basics Chapter 7: The SSH Server Basics Chapter 8: SSH on Windows Chapter 9: Linux SSH Chapter 10: Mac SSH Chapter 11: SSH Command Line and Advanced Client Use Chapter 12: SSH Server Advanced Use Chapter 13: SSH Port Forwarding Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309