Implementing SSH: Strategies for Optimizing the Secure Shell

Author:   Himanshu Dwivedi
Publisher:   John Wiley and Sons Ltd
ISBN:  

9780471458807


Pages:   402
Publication Date:   31 October 2003
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $92.40 Quantity:  
Add to Cart

Share |

Implementing SSH: Strategies for Optimizing the Secure Shell


Add your own review!

Overview

* The first book that concentrates on how to use SSH (Secure Shell), a security protocol, in the real world * Takes a close look at running SSH in virtually all operating systems, desktops, and servers, and how its potential is just starting to emerge * Covers how to use SSH with other management tools to protect against network attacks like IP spoofing, IP source routing, and DNS spoofing * Shows how to use SSH as a replacement for other insecure tools, such as using secure file transfer to replace FTP * Demonstrates how to use SSH as a VPN solution, in both a server and cli--ent aspect

Full Product Details

Author:   Himanshu Dwivedi
Publisher:   John Wiley and Sons Ltd
Imprint:   John Wiley & Sons Inc
Dimensions:   Width: 18.90cm , Height: 2.30cm , Length: 23.60cm
Weight:   0.595kg
ISBN:  

9780471458807


ISBN 10:   0471458805
Pages:   402
Publication Date:   31 October 2003
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Out of Stock Indefinitely
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Reviews

Author Information

HIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List