Implementing SSH strategies for optimizing the Secure Shell /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Dwivedi, Himanshu
Kaituhi rangatōpū: ebrary, Inc
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Indianapolis, Ind. ; [Chichester] : Wiley, c2004.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management
  • pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access
  • pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.