|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn316577448 |
003 |
OCoLC |
005 |
20231117015300.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
090320s2009 maua o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OPELS
|d OCLCQ
|d N$T
|d YDXCP
|d IDEBK
|d E7B
|d B24X7
|d UMI
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COO
|d Z5A
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d D6H
|d CEF
|d WYU
|d UAB
|d LEAUB
|d VT2
|d OCLCQ
|d OCLCO
|d UHL
|d VLY
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 316219909
|a 646787885
|a 666957595
|a 748091060
|a 755038495
|a 794596490
|a 1065080988
|a 1103262600
|a 1129366651
|a 1153047741
|a 1162202770
|a 1192340108
|a 1200576254
|a 1240533268
|
020 |
|
|
|a 9781597492836
|
020 |
|
|
|a 1597492833
|
020 |
|
|
|a 9780080570006
|q (electronic bk.)
|
020 |
|
|
|a 0080570003
|q (electronic bk.)
|
020 |
|
|
|a 1281928844
|
020 |
|
|
|a 9781281928849
|
020 |
|
|
|a 9786611928841
|
020 |
|
|
|a 6611928847
|
020 |
|
|
|a 9786612167430
|
020 |
|
|
|a 6612167432
|
035 |
|
|
|a (OCoLC)316577448
|z (OCoLC)316219909
|z (OCoLC)646787885
|z (OCoLC)666957595
|z (OCoLC)748091060
|z (OCoLC)755038495
|z (OCoLC)794596490
|z (OCoLC)1065080988
|z (OCoLC)1103262600
|z (OCoLC)1129366651
|z (OCoLC)1153047741
|z (OCoLC)1162202770
|z (OCoLC)1192340108
|z (OCoLC)1200576254
|z (OCoLC)1240533268
|
050 |
|
4 |
|a QA76.9.A25
|b L585 2009eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Liu, Dale.
|
245 |
1 |
0 |
|a Next generation SSH2 implementation :
|b securing data in motion /
|c Dale Liu, lead author and technical editor ; Max Caceres [and others].
|
260 |
|
|
|a Burlington, MA :
|b Syngress Pub.,
|c �2009.
|
300 |
|
|
|a 1 online resource (xxi, 312 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.
|
505 |
0 |
|
|a Acknowledgments -- Chapter 1: Introduction -- Chapter 2: OSI Model and Then Some -- Chapter 3: An Introduction to Cryptography -- Chapter 4: SSH Features -- Chapter 5: SSH Shortcomings -- Chapter 6: SSH Client Basics -- Chapter 7: The SSH Server Basics -- Chapter 8: SSH on Windows -- Chapter 9: Linux SSH -- Chapter 10: Mac SSH -- Chapter 11: SSH Command Line and Advanced Client Use -- Chapter 12: SSH Server Advanced Use -- Chapter 13: SSH Port Forwarding -- Index.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
630 |
0 |
0 |
|a UNIX Shells.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Chiffrement (Informatique)
|0 (CaQQLa)201-0259253
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
630 |
0 |
7 |
|a UNIX Shells.
|2 blmlsh
|
630 |
0 |
7 |
|a UNIX Shells
|2 fast
|0 (OCoLC)fst01371348
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
776 |
0 |
8 |
|i Print version:
|a Liu, Dale.
|t Next generation SSH2 implementation.
|d Burlington, MA : Syngress Pub., �2009
|z 9781597492836
|z 1597492833
|w (DLC) 2008040375
|w (OCoLC)213839373
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597492836
|z Texto completo
|