Cargando…

Next generation SSH2 implementation : securing data in motion /

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Liu, Dale
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn316577448
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 090320s2009 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d N$T  |d YDXCP  |d IDEBK  |d E7B  |d B24X7  |d UMI  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d Z5A  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d D6H  |d CEF  |d WYU  |d UAB  |d LEAUB  |d VT2  |d OCLCQ  |d OCLCO  |d UHL  |d VLY  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 316219909  |a 646787885  |a 666957595  |a 748091060  |a 755038495  |a 794596490  |a 1065080988  |a 1103262600  |a 1129366651  |a 1153047741  |a 1162202770  |a 1192340108  |a 1200576254  |a 1240533268 
020 |a 9781597492836 
020 |a 1597492833 
020 |a 9780080570006  |q (electronic bk.) 
020 |a 0080570003  |q (electronic bk.) 
020 |a 1281928844 
020 |a 9781281928849 
020 |a 9786611928841 
020 |a 6611928847 
020 |a 9786612167430 
020 |a 6612167432 
029 1 |a AU@  |b 000044594403 
029 1 |a AU@  |b 000053265785 
029 1 |a CHBIS  |b 006041502 
029 1 |a CHNEW  |b 001008739 
029 1 |a CHVBK  |b 170713806 
029 1 |a DEBBG  |b BV040902065 
029 1 |a DEBBG  |b BV042305287 
029 1 |a DEBSZ  |b 378295144 
029 1 |a DEBSZ  |b 381381293 
029 1 |a DEBSZ  |b 405323883 
029 1 |a NZ1  |b 15189180 
035 |a (OCoLC)316577448  |z (OCoLC)316219909  |z (OCoLC)646787885  |z (OCoLC)666957595  |z (OCoLC)748091060  |z (OCoLC)755038495  |z (OCoLC)794596490  |z (OCoLC)1065080988  |z (OCoLC)1103262600  |z (OCoLC)1129366651  |z (OCoLC)1153047741  |z (OCoLC)1162202770  |z (OCoLC)1192340108  |z (OCoLC)1200576254  |z (OCoLC)1240533268 
037 |a 157315:157481  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b L585 2009eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Liu, Dale. 
245 1 0 |a Next generation SSH2 implementation :  |b securing data in motion /  |c Dale Liu, lead author and technical editor ; Max Caceres [and others]. 
260 |a Burlington, MA :  |b Syngress Pub.,  |c ©2009. 
300 |a 1 online resource (xxi, 312 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox. 
505 0 |a Acknowledgments -- Chapter 1: Introduction -- Chapter 2: OSI Model and Then Some -- Chapter 3: An Introduction to Cryptography -- Chapter 4: SSH Features -- Chapter 5: SSH Shortcomings -- Chapter 6: SSH Client Basics -- Chapter 7: The SSH Server Basics -- Chapter 8: SSH on Windows -- Chapter 9: Linux SSH -- Chapter 10: Mac SSH -- Chapter 11: SSH Command Line and Advanced Client Use -- Chapter 12: SSH Server Advanced Use -- Chapter 13: SSH Port Forwarding -- Index. 
500 |a Includes index. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a UNIX Shells. 
630 0 7 |a UNIX Shells.  |2 blmlsh 
630 0 7 |a UNIX Shells  |2 fast 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
776 0 8 |i Print version:  |a Liu, Dale.  |t Next generation SSH2 implementation.  |d Burlington, MA : Syngress Pub., ©2009  |z 9781597492836  |z 1597492833  |w (DLC) 2008040375  |w (OCoLC)213839373 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597492836/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00032199 
938 |a ebrary  |b EBRY  |n ebr10269274 
938 |a EBSCOhost  |b EBSC  |n 249327 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 192884 
938 |a Internet Archive  |b INAR  |n nextgenerationss0000liud 
938 |a YBP Library Services  |b YANK  |n 2935169 
994 |a 92  |b IZTAP