Implementing SSH : strategies for optimizing the Secure Shell / / Himanshu Dwivedi.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2004
Language:English
Online Access:
Physical Description:xxvi, 376 p. :; ill.
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500215119
ctrlnum (MiAaPQ)500215119
(Au-PeEL)EBL215119
(CaPaEBR)ebr10114250
(CaONFJC)MIL35178
(OCoLC)133168806
collection bib_alma
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01734nam a2200385Ia 4500</leader><controlfield tag="001">500215119</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">040302s2004 inua s 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2004297174</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0471458805 (pbk)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500215119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL215119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10114250</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL35178</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)133168806</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.O63</subfield><subfield code="b">D895 2004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dwivedi, Himanshu.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing SSH</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">strategies for optimizing the Secure Shell /</subfield><subfield code="c">Himanshu Dwivedi.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Implementing secure shell</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Indianapolis, Ind. ;</subfield><subfield code="a">[Chichester] :</subfield><subfield code="b">Wiley,</subfield><subfield code="c">c2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 376 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">UNIX Shells.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=215119</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>
record_format marc
spelling Dwivedi, Himanshu.
Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
Implementing secure shell
Indianapolis, Ind. ; [Chichester] : Wiley, c2004.
xxvi, 376 p. : ill.
Includes index.
pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
UNIX Shells.
Computer networks Security measures.
Data encryption (Computer science)
Electronic books.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=215119 Click to View
language English
format Electronic
eBook
author Dwivedi, Himanshu.
spellingShingle Dwivedi, Himanshu.
Implementing SSH strategies for optimizing the Secure Shell /
pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
author_facet Dwivedi, Himanshu.
ProQuest (Firm)
ProQuest (Firm)
author_variant h d hd
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Dwivedi, Himanshu.
title Implementing SSH strategies for optimizing the Secure Shell /
title_sub strategies for optimizing the Secure Shell /
title_full Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
title_fullStr Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
title_full_unstemmed Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.
title_auth Implementing SSH strategies for optimizing the Secure Shell /
title_alt Implementing secure shell
title_new Implementing SSH
title_sort implementing ssh strategies for optimizing the secure shell /
publisher Wiley,
publishDate 2004
physical xxvi, 376 p. : ill.
contents pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.76 O63 D895 42004
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=215119
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 133168806
work_keys_str_mv AT dwivedihimanshu implementingsshstrategiesforoptimizingthesecureshell
AT proquestfirm implementingsshstrategiesforoptimizingthesecureshell
AT dwivedihimanshu implementingsecureshell
AT proquestfirm implementingsecureshell
status_str n
ids_txt_mv (MiAaPQ)500215119
(Au-PeEL)EBL215119
(CaPaEBR)ebr10114250
(CaONFJC)MIL35178
(OCoLC)133168806
is_hierarchy_title Implementing SSH strategies for optimizing the Secure Shell /
author2_original_writing_str_mv noLinkedField
_version_ 1792330669077037057