Wonder Club world wonders pyramid logo
×

SSH, the secure shell Book

SSH, the secure shell
SSH, the secure shell, , SSH, the secure shell has a rating of 4.5 stars
   2 Ratings
X
SSH, the secure shell, , SSH, the secure shell
4.5 out of 5 stars based on 2 reviews
5
50 %
4
50 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • SSH, the secure shell
  • Written by author Richard E. Silverman,Daniel J. Barrett,Richard Silverman,Mike Loukides
  • Published by Beijing ; O'Reilly, c2001., 2001/02/01
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of: SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications. Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security. Advanced key management using agents, agent forwarding, and forced commands. Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT). Undocumented behaviors of popular SSH implementations. Installing and maintaining SSH systems. Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

SSH, the secure shell, , SSH, the secure shell

X
WonderClub Home

This item is in your Collection

SSH, the secure shell, , SSH, the secure shell

SSH, the secure shell

X
WonderClub Home

This Item is in Your Inventory

SSH, the secure shell, , SSH, the secure shell

SSH, the secure shell

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: