Implementing SSH : strategies for optimizing the Secure Shell / / Himanshu Dwivedi.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2004
Language:English
Online Access:
Physical Description:xxvi, 376 p. :; ill.
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01734nam a2200385Ia 4500
001 500215119
003 MiAaPQ
005 20200520144314.0
006 m o d |
007 cr cn|||||||||
008 040302s2004 inua s 001 0 eng d
010 |z  2004297174 
020 |z 0471458805 (pbk) 
035 |a (MiAaPQ)500215119 
035 |a (Au-PeEL)EBL215119 
035 |a (CaPaEBR)ebr10114250 
035 |a (CaONFJC)MIL35178 
035 |a (OCoLC)133168806 
040 |a MiAaPQ  |c MiAaPQ  |d MiAaPQ 
050 4 |a QA76.76.O63  |b D895 2004 
082 0 4 |a 005.8  |2 22 
100 1 |a Dwivedi, Himanshu. 
245 1 0 |a Implementing SSH  |h [electronic resource] :  |b strategies for optimizing the Secure Shell /  |c Himanshu Dwivedi. 
246 3 |a Implementing secure shell 
260 |a Indianapolis, Ind. ;  |a [Chichester] :  |b Wiley,  |c c2004. 
300 |a xxvi, 376 p. :  |b ill. 
500 |a Includes index. 
505 0 |a pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies. 
533 |a Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. 
630 0 0 |a UNIX Shells. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
655 4 |a Electronic books. 
710 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=215119  |z Click to View