|
|
|||
|
||||
Overview* The first book that concentrates on how to use SSH (Secure Shell), a security protocol, in the real world * Takes a close look at running SSH in virtually all operating systems, desktops, and servers, and how its potential is just starting to emerge * Covers how to use SSH with other management tools to protect against network attacks like IP spoofing, IP source routing, and DNS spoofing * Shows how to use SSH as a replacement for other insecure tools, such as using secure file transfer to replace FTP * Demonstrates how to use SSH as a VPN solution, in both a server and cli--ent aspect Full Product DetailsAuthor: Himanshu DwivediPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Inc Dimensions: Width: 18.90cm , Height: 2.30cm , Length: 23.60cm Weight: 0.595kg ISBN: 9780471458807ISBN 10: 0471458805 Pages: 402 Publication Date: 31 October 2003 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Out of Stock Indefinitely Availability: In Print Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviewsAuthor InformationHIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment. Tab Content 6Author Website:Countries AvailableAll regions |