Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
"none" encryption
$HOME environment variable      
-- (double dash)      
3DES      
AAA (authentication, authorization, and accounting)      
AcceptEnv keyword      
Accession Lite      
Accession Lite, Enable Key Compatibility      
account access control      
account permissions and security      
active-mode (FTP)      
Address Space Layout Randomization (ASLR)      
AddressFamily keyword      2nd 3rd
addressing, single name, multiple address issue      
AES (Advanced Encryption Standard)      
AFS (Andrew File system)      
agents      2nd 3rd
agents, access control      
agents, agent forwarding      2nd 3rd
agents, agent forwarding, connections in series      
agents, agent forwarding, enabling      
agents, agent forwarding, firewall example      
agents, agent forwarding, operation      
agents, agent forwarding, server configuration      
agents, authentication agents      
agents, automatic loading      
agents, automatic loading, single-shell method      
agents, automatic loading, subshell method      
agents, automatic loading, X Windows      
agents, automation and      
agents, client identification      
agents, cpu usage      
agents, debugging (OpenSSH)      
agents, double-remote copying with scp      
agents, environment variable command format      
agents, identities, listing and deleting      
agents, invocation, login accounts      
agents, keys      
agents, keys, listing      
agents, keys, loading      2nd
agents, locking and unlocking      2nd
agents, protected memory      
agents, security aspects      
agents, security aspects, agent cracking      
agents, single-shell invocation      
agents, subshell invocation      
agents, switching identities      
agents, troubleshooting      
allow-from keyword      2nd
AllowAgentForwarding keyword (Tectia)      
AllowedAuthentications keyword (Tectia)      
AllowedAuthentications keyword (Tectia), gssapi      
AllowedAuthentications keyword (Tectia), hostbased      
AllowedAuthentications keyword (Tectia), keyboard interactive      
AllowGroups keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
AllowHosts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
AllowSHosts keyword      2nd 3rd 4th 5th
AllowTcpForwarding keyword      2nd 3rd 4th 5th 6th 7th 8th
AllowTcpForwardingForGroups keyword      2nd 3rd 4th
AllowTcpForwardingForUsers keyword      2nd 3rd 4th 5th
AllowUsers keyword      
AllowUsers keyword, pattern matching      
AllowX11Forwarding keyword      2nd 3rd 4th
ASLR (Address Space Layout Randomization)      
asymmetric cryptography      
Attacks      
attacks, agent cracking      
attacks, brute-force attacks      
attacks, connection hijacking      
attacks, covert channels      
attacks, dictionary attack      
attacks, eavesdropping      
attacks, IP attacks      
attacks, IP spoofing      
attacks, keystroke timing data and potential attacks      
attacks, man-in-the-middle attacks      2nd
attacks, name service spoofing      
attacks, password cracking      
attacks, replay attacks      
attacks, TCP attacks      
attacks, traffic analysis      
attacks, user or administrator carelessness and      
Authentication      2nd
authentication, authorization in hostbased authentication (SSH)      
authentication, failure messages      
authentication, passwordless      
authentication, per-account configuration and      
authentication, scalability case study      
authentication, SecurID hardware-based authentication      
authentication, ssh (client) configuration      
authentication, troubleshooting      
AuthenticationNotify keyword      2nd 3rd
AuthenticationSuccessMsg keyword      2nd 3rd
AuthInteractiveFailureTimeout keyword (Tectia)      2nd
AuthKbdInt.NumOptional keyword (Tectia)      
AuthKbdInt.Optional keyword      2nd 3rd 4th
AuthKbdInt.Plugin keyword      2nd 3rd 4th 5th 6th
AuthKbdInt.RADIUS.NASIdentifier keyword
AuthKbdInt.RADIUS.Server keyword
AuthKbdInt.Required keyword      2nd 3rd 4th
AuthKbdInt.Retries keyword (Tectia)
Authorization      
authorization files, server accounts      
AuthorizationFile keyword      2nd 3rd 4th
AuthorizedKeysFile keyword      2nd
authorized_keys      2nd
AuthPassword.ChangePlugin keyword      2nd 3rd 4th
AuthPublicKey.MinSize and MaxSize keywords (Tectia)      
Autoconf      
Axessh      
BAMSE
Banner keyword (OpenSSH)
BannerMessageFile keyword (Tectia)      
Bastion host      
batch jobs      
batch jobs, hostbased authentication      
batch jobs, Kerberos authentication
batch jobs, password authentication      
batch jobs, public-key authentication
batch jobs, public-key authentication, agents      
batch jobs, public-key authentication, filesystem passphrase storage
batch jobs, public-key authentication, plaintext keys
batch jobs, security precautions
batch jobs, security precautions, least-privilege accounts      
batch jobs, security precautions, locked-down automation accounts      
batch jobs, security precautions, restricted-use keys      
batch jobs, security precautions, ssh options      
BatchMode keyword      2nd 3rd 4th
BeOS SSH implementations      
binary distributions      
binary packet protocol
BindAddress keyword      2nd
Blowfish
bogus ICMP attacks      
boot versus manual invocation
brute-force attacks
bulk keys or bulk ciphers      
bzip2 and bunzip2
cancel-tcpip-forward request
case studies
case studies, authentication      
case studies, FTP      
case studies, gateway hosts, connecting through
case studies, Pine email client      
Cast      
Cert.DODPKI keyword
Cert.EndpointIdentityCheck keyword
Cert.RSA.Compat.HashScheme keyword      2nd 3rd
CertdListenerPath keyword      2nd
certificate authorities      
challenge/response authentication      
ChallengeResponseAuthentication keyword      2nd
Channels      2nd
channels, channel numbers      
channels, channel requests      
CheckHostIP keyword      2nd
CheckMail keyword (Tectia)
ChRootGroups keyword      2nd 3rd
ChRootUsers keyword      2nd 3rd
Cipher keyword      2nd 3rd 4th
ciphers
Ciphers keyword      2nd 3rd 4th 5th 6th 7th 8th
ClearAllForwardings keyword      2nd 3rd
client configuration      
client configuration, debugging messages      
client configuration, setup recommendations      
client configuration, troubleshooting
ClientAliveCountMax keyword      2nd
ClientAliveInterval keyword      2nd 3rd
Command keyword      
Commodore Amiga SSH implementations      
compression algorithms
Compression keyword      2nd 3rd 4th 5th 6th 7th 8th 9th
CompressionLevel keyword      2nd
Configuration
configuration, "none" encryption      
configuration, compile-time configuration
configuration, configuration files
configuration, configure script
configuration, configure script, command-line flags      
configuration, configure script, options
configuration, configure script, pathname embedding versus PATH variable      
configuration, make command
connection hijacking      
ConnectionAttempts keyword
Connector
ConnectTimeout keyword      2nd
control connections (FTP)
control connections (FTP), forwarding      
control connections (FTP), forwarding, choosing the target
ControlMaster keyword      2nd 3rd
ControlPath keyword      2nd 3rd
covert channels
CRC (Cyclic Redundancy Check) hash      
CRC-32 (Cyclic Redundancy Check)      
Cryptanalysis
Cryptography      
cryptography, hash functions      
cryptography, public-key cryptography      
cryptography, secret-key cryptography      
cryptography, security      
CVS (Concurrent Versions System)      
Cyclic Redundancy Check (CRC-32)
Cygwin
data connections (FTP)
Data Encryption Standard (DES)
Debugging      
debugging, messages
debugging, serverwide configuration
debugging, serverwide configuration, syslog files
DebugLogFile keyword      
default identity
DefaultDomain keyword
deny-from keyword      2nd
DenyGroups
DenyGroups keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenyHosts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DenySHosts keyword      2nd 3rd 4th 5th
DenyTcpForwardingForGroups keyword      2nd 3rd 4th
DenyTcpForwardingForUsers keyword      2nd 3rd 4th
DenyUsers keyword      
DenyUsers keyword, pattern matching      
DES (Data Encryption Standard)      
dictionary attack      
Diffie-Hellman key agreement algorithm
Digital certificates
Digital Signature Algorithm (DSA)
Digital signatures
DisableVersionFallback keyword      2nd 3rd
Display
DNS (Domain Name Service)      
DontReadStdin keyword      2nd
DropBear
DSA (Digital Signature Algorithm)
dynamic port forwarding
DynamicForward keyword      2nd
eavesdropping
Egrep, sshregex (Tectia)
Egrep, sshregex (Tectia), character sets
Egrep, sshregex (Tectia), escaped tokens
EkInitString keyword      2nd
EkProvider keyword      2nd
EnableSSHKeysign keyword      2nd 3rd
Encryption      2nd
encryption, algorithms      
encryption, algorithms, ssh (client)
encryption, programs
env channel request
Environment variables      
environment variables, agents and      
environment variables, per-account settings      
environment variables, ssh (client)      
Ericom PowerTerm
escape characters and sequences
EscapeChar keyword      2nd 3rd 4th
exec channel request
Expect
ExternalAuthorizationProgram keyword      2nd 3rd
F-Secure SSH
file transfers
file transfers, sftp
filesystems, recommended settings
Firewalls      2nd
firewalls, FTP passive mode and
firewalls, port forwarding, bypassing with
forced commands      2nd
forced commands, command menu, displaying
forced commands, logging
forced commands, rejecting connections
forced commands, scp and
forced commands, security concerns
forced commands, SSH_ORIGINAL_COMMAND environment variable
ForcePTTYAllocation keyword      2nd
ForwardACL keyword      2nd 3rd 4th 5th 6th
ForwardAgent keyword
Forwarding      2nd
forwarding, limiting or disabling per-account
ForwardX11 keyword      2nd 3rd 4th 5th 6th
ForwardX11Trusted keyword      2nd
Friedl, Markus
ftp (file transfer protocol)      2nd
FTP, case study
FTP, case study, control connection forwarding
FTP, case study, static port forwarding      
FTP, case study, Tectia client
FTP, case study, VanDyke's SecureFX tool
FTP, data connections, forwarding through SSH
FTP, default data port mode      
FTP, default data port mode, TCP protocol and
FTP, NAT and
FTP, passive mode      2nd
FTP, passive mode, firewalls and
FTP, passive mode, PASV port theft problem
FTP, SSL-enhanced      
FTP, troubleshooting
FTP, typical data transfer mode
gateway hosts
gateway hosts, case study
gateway hosts, case study, port forwarding (SSH-in-SSH)
gateway hosts, case study, scp
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте