SSH, The Secure Shell: The Definitive Guide: The Definitive Guide
4/5
()
Currently unavailable
Currently unavailable
About this ebook
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Daniel J. Barrett
Daniel J. Barrett has been teaching and writing about Linux and related technologies for more than 30 years. He is an author of numerous O’Reilly books such as Efficient Linux at the Command Line, Linux Security Cookbook, SSH, The Secure Shell: The Definitive Guide, Macintosh Terminal Pocket Guide, and MediaWiki. Dan has also been a software engineer, heavy metal singer, system administrator, university lecturer, web designer, and humorist. He works at Google. Visit DanielJBarrett.com to learn more.
Read more from Daniel J. Barrett
Never Say Never Rating: 5 out of 5 stars5/5Death but No Taxes Rating: 5 out of 5 stars5/5Can't Sing or Dance Rating: 0 out of 5 stars0 ratingsYou Don't Know Jack Rating: 0 out of 5 stars0 ratingsThe Academy Rating: 0 out of 5 stars0 ratingsConch Town Girl Rating: 0 out of 5 stars0 ratingsSecond Chances Rating: 0 out of 5 stars0 ratingsTaking Care of Your Own Rating: 0 out of 5 stars0 ratings
Related to SSH, The Secure Shell
Related ebooks
Next Generation SSH2 Implementation: Securing Data in Motion Rating: 0 out of 5 stars0 ratingsOpen Source Software: Implementation and Management Rating: 0 out of 5 stars0 ratingsProfessional Heroku Programming Rating: 4 out of 5 stars4/5SIP Security Rating: 0 out of 5 stars0 ratingsSecuring DevOps: Security in the Cloud Rating: 0 out of 5 stars0 ratingsLiving With Linux In the Industrial World Rating: 0 out of 5 stars0 ratingsDevOps and Containers Security: Security and Monitoring in Docker Containers Rating: 0 out of 5 stars0 ratingsLearning Docker Rating: 5 out of 5 stars5/5Java Cryptography Extensions: Practical Guide for Programmers Rating: 5 out of 5 stars5/5In Depth Security Vol. III: Proceedings of the DeepSec Conferences Rating: 0 out of 5 stars0 ratingsExtending Docker Rating: 0 out of 5 stars0 ratingsDocker Essentials: Simplifying Containerization: A Beginner's Guide Rating: 0 out of 5 stars0 ratingsOpenStack Essentials - Second Edition Rating: 0 out of 5 stars0 ratingsAgents Unleashed: A Public Domain Look at Agent Technology Rating: 0 out of 5 stars0 ratingsProfessional Node.js: Building Javascript Based Scalable Software Rating: 0 out of 5 stars0 ratingsMulti-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations Rating: 0 out of 5 stars0 ratingsPractical Programmable Circuits: A Guide to PLDs, State Machines, and Microcontrollers Rating: 0 out of 5 stars0 ratingsNative Docker Clustering with Swarm Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Docker, Containers And All The Rest: First Edition, #1 Rating: 0 out of 5 stars0 ratingsWeb Services: Theory and Practice Rating: 0 out of 5 stars0 ratingsSRS - How to build a Pen Test and Hacking Platform Rating: 2 out of 5 stars2/5Symbian OS Internals: Real-time Kernel Programming Rating: 0 out of 5 stars0 ratings
Networking For You
Unlock Any Roku Device: Watch Shows, TV, & Download Apps Rating: 0 out of 5 stars0 ratingsThe Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5Networking All-in-One For Dummies Rating: 5 out of 5 stars5/5Hacking Android Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsTCP/IP Clearly Explained Rating: 4 out of 5 stars4/5Quantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsAWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam Rating: 0 out of 5 stars0 ratingsNetworking For Dummies Rating: 5 out of 5 stars5/5A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsNetworking Fundamentals: Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366 Rating: 0 out of 5 stars0 ratingsAWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5SharePoint For Dummies Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsRaspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5CCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsMCA Microsoft Certified Associate Azure Administrator Study Guide: Exam AZ-104 Rating: 0 out of 5 stars0 ratingsCisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Windows Command Line Administration Instant Reference Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners: Computer Networking, #3 Rating: 0 out of 5 stars0 ratingsComputer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Architecture of Network Systems Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5
Reviews for SSH, The Secure Shell
28 ratings1 review
- Rating: 4 out of 5 stars4/5Although now (2006) a bit long in the tooth, this first edition is still a solid introduction to SSH concepts and configuration. I imagine the second edition is even better.