|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocm53898632 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
031212s2004 inua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d TUU
|d OCLCQ
|d B24X7
|d TNF
|d OCLCQ
|d COCUF
|d TEFOD
|d IDEBK
|d NTG
|d QE2
|d DKDLA
|d U5D
|d OCLCE
|d E7B
|d EBLCP
|d OCLCO
|d CSU
|d DEBSZ
|d OCLCF
|d OCLCQ
|d NLGGC
|d OCLCQ
|d AZK
|d CNNOR
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCO
|d WY@
|d U3W
|d LUE
|d BRL
|d STF
|d WRM
|d OCLCQ
|d ICG
|d NRAMU
|d MOQ
|d VT2
|d INT
|d OCLCQ
|d OCLCO
|d AU@
|d COO
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d CEF
|d OCLCQ
|d UX1
|d OCLCQ
|d HS0
|d UWK
|d ADU
|d UKCRE
|d BRF
|d EYM
|d OCLCQ
|d OCLCO
|d INARC
|d OCLCO
|d OCLCQ
|d Q2U
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 56136951
|a 61333511
|a 62786628
|a 133168806
|a 475327725
|a 481670334
|a 560016890
|a 606027367
|a 607016986
|a 609254794
|a 722440749
|a 740948204
|a 814361381
|a 824544070
|a 922973519
|a 927461052
|a 961641071
|a 962604758
|a 973974484
|a 974200701
|a 981405282
|a 981556517
|a 988445282
|a 991945812
|a 992022582
|a 1005639843
|a 1017996934
|a 1037419386
|a 1038676915
|a 1042326555
|a 1042978361
|a 1045526225
|a 1055255631
|a 1059121094
|a 1060194743
|a 1063810305
|a 1081293433
|a 1096479761
|a 1097114357
|a 1100532266
|a 1101715275
|a 1109285025
|a 1110359820
|a 1113428186
|a 1119150272
|a 1153461161
|a 1162464889
|a 1179710055
|a 1194863725
|a 1228606435
|a 1280770259
|a 1280930346
|a 1290081745
|a 1316347488
|a 1407443416
|
020 |
|
|
|a 0764557254
|q (electronic bk.)
|
020 |
|
|
|a 9780764557255
|q (electronic bk.)
|
020 |
|
|
|a 0471458805
|q (pbk.)
|
020 |
|
|
|a 9780471458807
|q (pbk.)
|
020 |
|
|
|a 1280351780
|
020 |
|
|
|a 9781280351785
|
020 |
|
|
|a 9786610351787
|
020 |
|
|
|a 6610351783
|
029 |
1 |
|
|a AU@
|b 000053224126
|
029 |
1 |
|
|a AU@
|b 000073083468
|
029 |
1 |
|
|a DEBBG
|b BV044078993
|
029 |
1 |
|
|a DEBSZ
|b 396057616
|
029 |
1 |
|
|a DEBSZ
|b 449064921
|
029 |
1 |
|
|a NZ1
|b 12033774
|
035 |
|
|
|a (OCoLC)53898632
|z (OCoLC)56136951
|z (OCoLC)61333511
|z (OCoLC)62786628
|z (OCoLC)133168806
|z (OCoLC)475327725
|z (OCoLC)481670334
|z (OCoLC)560016890
|z (OCoLC)606027367
|z (OCoLC)607016986
|z (OCoLC)609254794
|z (OCoLC)722440749
|z (OCoLC)740948204
|z (OCoLC)814361381
|z (OCoLC)824544070
|z (OCoLC)922973519
|z (OCoLC)927461052
|z (OCoLC)961641071
|z (OCoLC)962604758
|z (OCoLC)973974484
|z (OCoLC)974200701
|z (OCoLC)981405282
|z (OCoLC)981556517
|z (OCoLC)988445282
|z (OCoLC)991945812
|z (OCoLC)992022582
|z (OCoLC)1005639843
|z (OCoLC)1017996934
|z (OCoLC)1037419386
|z (OCoLC)1038676915
|z (OCoLC)1042326555
|z (OCoLC)1042978361
|z (OCoLC)1045526225
|z (OCoLC)1055255631
|z (OCoLC)1059121094
|z (OCoLC)1060194743
|z (OCoLC)1063810305
|z (OCoLC)1081293433
|z (OCoLC)1096479761
|z (OCoLC)1097114357
|z (OCoLC)1100532266
|z (OCoLC)1101715275
|z (OCoLC)1109285025
|z (OCoLC)1110359820
|z (OCoLC)1113428186
|z (OCoLC)1119150272
|z (OCoLC)1153461161
|z (OCoLC)1162464889
|z (OCoLC)1179710055
|z (OCoLC)1194863725
|z (OCoLC)1228606435
|z (OCoLC)1280770259
|z (OCoLC)1280930346
|z (OCoLC)1290081745
|z (OCoLC)1316347488
|z (OCoLC)1407443416
|
037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .D95 2004eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UACD
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dwivedi, Himanshu.
|
245 |
1 |
0 |
|a Implementing SSH :
|b strategies for optimizing the Secure Shell /
|c Himanshu Dwivedi.
|
246 |
3 |
|
|a Implementing Secure Shell
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xxvi, 376 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
520 |
|
|
|a A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your networkPrevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, i.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a UNIX Shells.
|
630 |
0 |
7 |
|a UNIX Shells
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a UNIX (OPERATING SYSTEM)
|2 nasat
|
650 |
|
7 |
|a COMPUTER NETWORKS.
|2 nasat
|
650 |
|
7 |
|a COMPUTER INFORMATION SECURITY.
|2 nasat
|
650 |
|
7 |
|a COMPUTER VIRUSES.
|2 nasat
|
650 |
|
7 |
|a SOFTWARE TOOLS.
|2 nasat
|
758 |
|
|
|i has work:
|a Implementing SSH [electronic resource] (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYtkH3w4jMCQWRhyVvBfyH
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Dwivedi, Himanshu.
|t Implementing SSH.
|d Indianapolis, Ind. : Wiley, ©2004
|z 0471458805
|w (OCoLC)53881636
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=215119
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00004259
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 100948
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2338562
|
938 |
|
|
|a Internet Archive
|b INAR
|n implementingsshs0000dwiv
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0006749949
|
994 |
|
|
|a 92
|b IZTAP
|