Implementing SSH strategies for optimizing the Secure Shell /

Saved in:
Bibliographic Details
Main Author: Dwivedi, Himanshu
Corporate Author: ebrary, Inc
Format: Electronic eBook
Language:English
Published: Indianapolis, Ind. ; [Chichester] : Wiley, c2004.
Subjects:
Online Access:An electronic book accessible through the World Wide Web; click to view
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000Ia 4500
001 0000082899
005 20171002054149.0
006 m u
007 cr cn|||||||||
008 040302s2004 inua s 001 0 eng d
010 |z  2004297174 
020 |z 0471458805 (pbk) 
035 |a (CaPaEBR)ebr10114250 
035 |a (OCoLC)133168806 
040 |a CaPaEBR  |c CaPaEBR 
050 1 4 |a QA76.76.O63  |b D895 2004eb 
082 0 4 |a 005.8  |2 22 
100 1 |a Dwivedi, Himanshu. 
245 1 0 |a Implementing SSH  |h [electronic resource] :  |b strategies for optimizing the Secure Shell /  |c Himanshu Dwivedi. 
246 3 |a Implementing secure shell 
260 |a Indianapolis, Ind. ;  |a [Chichester] :  |b Wiley,  |c c2004. 
300 |a xxvi, 376 p. :  |b ill. 
500 |a Includes index. 
505 0 |a pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies. 
533 |a Electronic reproduction.  |b Palo Alto, Calif. :  |c ebrary,  |d 2009.  |n Available via World Wide Web.  |n Access may be limited to ebrary affiliated libraries. 
630 0 0 |a UNIX Shells. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
655 7 |a Electronic books.  |2 local 
710 2 |a ebrary, Inc. 
856 4 0 |u http://site.ebrary.com/lib/daystar/Doc?id=10114250  |z An electronic book accessible through the World Wide Web; click to view 
908 |a 170314 
942 0 0 |c EB 
999 |c 72057  |d 72057