Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
"none" encryption
$HOME environment variable      
-- (double dash)      
3DES      
AAA (authentication, authorization, and accounting)      
AcceptEnv keyword      
Accession Lite      
Accession Lite, Enable Key Compatibility      
account access control      
account permissions and security      
active-mode (FTP)      
Address Space Layout Randomization (ASLR)      
AddressFamily keyword      2nd 3rd
addressing, single name, multiple address issue      
AES (Advanced Encryption Standard)      
AFS (Andrew File system)      
agents      2nd 3rd
agents, access control      
agents, agent forwarding      2nd 3rd
agents, agent forwarding, connections in series      
agents, agent forwarding, enabling      
agents, agent forwarding, firewall example      
agents, agent forwarding, operation      
agents, agent forwarding, server configuration      
agents, authentication agents      
agents, automatic loading      
agents, automatic loading, single-shell method      
agents, automatic loading, subshell method      
agents, automatic loading, X Windows      
agents, automation and      
agents, client identification      
agents, cpu usage      
agents, debugging (OpenSSH)      
agents, double-remote copying with scp      
agents, environment variable command format      
agents, identities, listing and deleting      
agents, invocation, login accounts      
agents, keys      
agents, keys, listing      
agents, keys, loading      2nd
agents, locking and unlocking      2nd
agents, protected memory      
agents, security aspects      
agents, security aspects, agent cracking      
agents, single-shell invocation      
agents, subshell invocation      
agents, switching identities      
agents, troubleshooting      
allow-from keyword      2nd
AllowAgentForwarding keyword (Tectia)      
AllowedAuthentications keyword (Tectia)      
AllowedAuthentications keyword (Tectia), gssapi      
AllowedAuthentications keyword (Tectia), hostbased      
AllowedAuthentications keyword (Tectia), keyboard interactive      
AllowGroups keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
AllowHosts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
AllowSHosts keyword      2nd 3rd 4th 5th
AllowTcpForwarding keyword      2nd 3rd 4th 5th 6th 7th 8th
AllowTcpForwardingForGroups keyword      2nd 3rd 4th
AllowTcpForwardingForUsers keyword      2nd 3rd 4th 5th
AllowUsers keyword      
AllowUsers keyword, pattern matching      
AllowX11Forwarding keyword      2nd 3rd 4th
ASLR (Address Space Layout Randomization)      
asymmetric cryptography      
Attacks      
attacks, agent cracking      
attacks, brute-force attacks      
attacks, connection hijacking      
attacks, covert channels      
attacks, dictionary attack      
attacks, eavesdropping      
attacks, IP attacks      
attacks, IP spoofing      
attacks, keystroke timing data and potential attacks      
attacks, man-in-the-middle attacks      2nd
attacks, name service spoofing      
attacks, password cracking      
attacks, replay attacks      
attacks, TCP attacks      
attacks, traffic analysis      
attacks, user or administrator carelessness and      
Authentication      2nd
authentication, authorization in hostbased authentication (SSH)      
authentication, failure messages      
authentication, passwordless      
authentication, per-account configuration and      
authentication, scalability case study      
authentication, SecurID hardware-based authentication      
authentication, ssh (client) configuration      
authentication, troubleshooting      
AuthenticationNotify keyword      2nd 3rd
AuthenticationSuccessMsg keyword      2nd 3rd
AuthInteractiveFailureTimeout keyword (Tectia)      2nd
AuthKbdInt.NumOptional keyword (Tectia)      
AuthKbdInt.Optional keyword      2nd 3rd 4th
AuthKbdInt.Plugin keyword      2nd 3rd 4th 5th 6th
AuthKbdInt.RADIUS.NASIdentifier keyword      
AuthKbdInt.RADIUS.Server keyword      
AuthKbdInt.Required keyword      2nd 3rd 4th
AuthKbdInt.Retries keyword (Tectia)      
Authorization      
authorization files, server accounts      
AuthorizationFile keyword      2nd 3rd 4th
AuthorizedKeysFile keyword      2nd
authorized_keys      2nd
AuthPassword.ChangePlugin keyword      2nd 3rd 4th
AuthPublicKey.MinSize and MaxSize keywords (Tectia)      
Autoconf      
Axessh      
BAMSE      
Banner keyword (OpenSSH)      
BannerMessageFile keyword (Tectia)      
Bastion host      
batch jobs      
batch jobs, hostbased authentication      
batch jobs, Kerberos authentication      
batch jobs, password authentication      
batch jobs, public-key authentication      
batch jobs, public-key authentication, agents      
batch jobs, public-key authentication, filesystem passphrase storage      
batch jobs, public-key authentication, plaintext keys      
batch jobs, security precautions      
batch jobs, security precautions, least-privilege accounts      
batch jobs, security precautions, locked-down automation accounts      
batch jobs, security precautions, restricted-use keys      
batch jobs, security precautions, ssh options      
BatchMode keyword      2nd 3rd 4th
BeOS SSH implementations      
binary distributions      
binary packet protocol      
BindAddress keyword      2nd
Blowfish      
bogus ICMP attacks      
boot versus manual invocation      
brute-force attacks      
bulk keys or bulk ciphers      
bzip2 and bunzip2      
cancel-tcpip-forward request      
case studies      
case studies, authentication      
case studies, FTP      
case studies, gateway hosts, connecting through      
case studies, Pine email client      
Cast      
Cert.DODPKI keyword      
Cert.EndpointIdentityCheck keyword      
Cert.RSA.Compat.HashScheme keyword      2nd 3rd
CertdListenerPath keyword      2nd
certificate authorities      
challenge/response authentication      
ChallengeResponseAuthentication keyword      2nd
Channels      2nd
channels, channel numbers      
channels, channel requests      
CheckHostIP keyword      2nd
CheckMail keyword (Tectia)      
ChRootGroups keyword      2nd 3rd
ChRootUsers keyword      2nd 3rd
Cipher keyword      2nd 3rd 4th
ciphers      
Ciphers keyword      2nd 3rd 4th 5th 6th 7th 8th
ClearAllForwardings keyword      2nd 3rd
client configuration      
client configuration, debugging messages      
client configuration, setup recommendations      
client configuration, troubleshooting      
ClientAliveCountMax keyword      2nd
ClientAliveInterval keyword      2nd 3rd
Command keyword      
Commodore Amiga SSH implementations      
compression algorithms      
Compression keyword      2nd 3rd 4th 5th 6th 7th 8th 9th
CompressionLevel keyword      2nd
Configuration      
configuration, "none" encryption
configuration, compile-time configuration      
configuration, configuration files      
configuration, configure script      
configuration, configure script, command-line flags      
configuration, configure script, options      
configuration, configure script, pathname embedding versus PATH variable      
configuration, make command      
connection hijacking      
ConnectionAttempts keyword      
Connector      
ConnectTimeout keyword      2nd
control connections (FTP)      
control connections (FTP), forwarding      
control connections (FTP), forwarding, choosing the target      
ControlMaster keyword      2nd 3rd
ControlPath keyword      2nd 3rd
covert channels      
CRC (Cyclic Redundancy Check) hash      
CRC-32 (Cyclic Redundancy Check)      
Cryptanalysis      
Cryptography      
cryptography, hash functions      
cryptography, public-key cryptography      
cryptography, secret-key cryptography      
cryptography, security      
CVS (Concurrent Versions System)      
Cyclic Redundancy Check (CRC-32)      
Cygwin      
data connections (FTP)      
Data Encryption Standard (DES)      
Debugging      
debugging, messages      
debugging, serverwide configuration      
debugging, serverwide configuration, syslog files      
DebugLogFile keyword      
default identity      
DefaultDomain keyword      
deny-from keyword      2nd
DenyGroups      
DenyGroups keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenyHosts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenySHosts keyword      2nd 3rd 4th 5th
DenyTcpForwardingForGroups keyword      2nd 3rd 4th
DenyTcpForwardingForUsers keyword      2nd 3rd 4th
DenyUsers keyword      
DenyUsers keyword, pattern matching      
DES (Data Encryption Standard)      
dictionary attack      
Diffie-Hellman key agreement algorithm      
Digital certificates      
Digital Signature Algorithm (DSA)      
Digital signatures      
DisableVersionFallback keyword      2nd 3rd
Display      
DNS (Domain Name Service)      
DontReadStdin keyword      2nd
DropBear      
DSA (Digital Signature Algorithm)      
dynamic port forwarding      
DynamicForward keyword      2nd
eavesdropping      
Egrep, sshregex (Tectia)      
Egrep, sshregex (Tectia), character sets      
Egrep, sshregex (Tectia), escaped tokens      
EkInitString keyword      2nd
EkProvider keyword      2nd
EnableSSHKeysign keyword      2nd 3rd
Encryption      2nd
encryption, algorithms      
encryption, algorithms, ssh (client)      
encryption, programs      
env channel request      
Environment variables      
environment variables, agents and      
environment variables, per-account settings      
environment variables, ssh (client)      
Ericom PowerTerm      
escape characters and sequences      
EscapeChar keyword      2nd 3rd 4th
exec channel request      
Expect      
ExternalAuthorizationProgram keyword      2nd 3rd
F-Secure SSH      
file transfers      
file transfers, sftp      
filesystems, recommended settings      
Firewalls      2nd
firewalls, FTP passive mode and      
firewalls, port forwarding, bypassing with      
forced commands      2nd
forced commands, command menu, displaying      
forced commands, logging      
forced commands, rejecting connections      
forced commands, scp and      
forced commands, security concerns      
forced commands, SSH_ORIGINAL_COMMAND environment variable      
ForcePTTYAllocation keyword      2nd
ForwardACL keyword      2nd 3rd 4th 5th 6th
ForwardAgent keyword      
Forwarding      2nd
forwarding, limiting or disabling per-account      
ForwardX11 keyword      2nd 3rd 4th 5th 6th
ForwardX11Trusted keyword      2nd
Friedl, Markus      
ftp (file transfer protocol)      2nd
FTP, case study      
FTP, case study, control connection forwarding      
FTP, case study, static port forwarding      
FTP, case study, Tectia client      
FTP, case study, VanDyke's SecureFX tool      
FTP, data connections, forwarding through SSH      
FTP, default data port mode      
FTP, default data port mode, TCP protocol and      
FTP, NAT and      
FTP, passive mode      2nd
FTP, passive mode, firewalls and      
FTP, passive mode, PASV port theft problem      
FTP, SSL-enhanced      
FTP, troubleshooting      
FTP, typical data transfer mode      
gateway hosts      
gateway hosts, case study      
gateway hosts, case study, port forwarding (SSH-in-SSH)      
gateway hosts, case study, scp      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2020
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте