Implementing SSH strategies for optimizing the Secure Shell /
Wedi'i Gadw mewn:
Prif Awdur: | |
---|---|
Awdur Corfforaethol: | |
Fformat: | Electronig eLyfr |
Iaith: | Saesneg |
Cyhoeddwyd: |
Indianapolis, Ind. ; [Chichester] :
Wiley,
c2004.
|
Pynciau: | |
Mynediad Ar-lein: | An electronic book accessible through the World Wide Web; click to view |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Tabl Cynhwysion:
- pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management
- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access
- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.