Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
gateway hosts, case study, SSH connection, making      
gateway hosts, case study, tunnelled SSH withProxyCommand      
GatewayPorts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
GlobalKnownHostsFile keyword      
GNU Emacs and SSH      
GnuPG (Gnu Privacy Guard)      
GoBackground keyword      2nd
gPutty      
group access control      
GSSAPI      
GSSAPI.AllowedMethods keyword (Tectia)      
GSSAPI.AllowOldMethodWhichIsInsecure keyword      2nd 3rd
GSSAPI.DelegateToken keyword      
GSSAPI.Dlls keyword (Tectia)      
GSSAPIAuthentication keyword (OpenSSH)      
GSSAPICleanupCredentials keyword      2nd
GSSAPIDelegateCredentials keyword      
gzip and gunzip      
hash functions      2nd
hash functions, collision-resistance and pre-image-resistance      
HOME environment variable      
host keys      2nd
host keys, implementation dependency, SSH      
Host keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
host-key generation      
hostbased authentication      
hostbased authentication, batch jobs and      
hostbased authentication, per-account configuration and      
hostbased authentication, security of      
hostbased authentication, server configuration for      
hostbased authentication, troubleshooting      
HostbasedAuthentication keyword (OpenSSH)      
HostbasedAuthForceClientHostnameDNSMatch keyword      2nd 3rd
HostCa keyword      2nd
HostCAMoCRLs keyword      2nd
HostCertificateFile keyword      2nd 3rd
HostKey keyword      2nd
HostKeyAlgorithms keyword      2nd
HostKeyAlias keyword      2nd 3rd 4th
HostKeyEkInitString keyword      2nd
HostKeyEkProvider keyword      
HostKeyEkTimeOut keyword      2nd
HostKeyFile keyword      2nd 3rd
HostName keyword      2nd 3rd
Hosts      
HostSpecificConfig keyword (Tectia)      
hostspecs      
IDEA (International Data Encryption Algorithm)      
identification files (Tectia)      
identities      2nd
identities, creating      
identities, creating, Diffie-Hellman key exchange, group generation      
identities, default identity      
identities, listing and deleting      
identities, manual switching      
identities, multiple identities      
identities, OpenSSH      
identities, switching with agents      
identities, tailored sessions      
identities, Tectia      
IdentitiesOnly keyword      2nd
IdentityFile keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
IdKey keyword      2nd
idle-timeout keyword      2nd 3rd 4th
IdleTimeout keyword      
IdPgpKeyFingerprint keyword      2nd
IdPgpKeyId keyword      2nd
IdPgpKeyName keyword      2nd
IgnoreLoginRestrictions.PasswordExpiration keyword      
IgnoreLoginRestrictions.Rlogin.AIX keyword      
IgnoreRhosts keyword      2nd 3rd 4th 5th 6th 7th 8th
IgnoreRootRhosts keyword (Tectia)      
IgnoreUserKnownHosts keyword (OpenSSH)      
IMAP (Internet Message Access Protocol)      
IMAP, authentication      
inetd      
inetd, server configuration and debugging      
inetd, server invocation using      
initialization scripts, SSH servers      
Installation      
installation, on Unix systems      
installation, prerequisites      
installation, signature verification      
installation, software inventory, table      
installation, source code      
installation, source files      
installation, source files, extraction      
installation, symbolic links created during      
installation, Unix implementations      
installation, Unix implementations, binary distributions      
Integrity      
Integrity checking      2nd
interactive sessions, authentication without passwords      
IP attacks      
IP spoofing      
IPSEC (Internet Protocol Security)      
J2SSH Maverick      
Java SSH implementations      
JavaSSH      
JSch      
kadmin command      
KDC (Key Distribution Center)      
KeepAlive keyword      
keepalive messages      
Kerberos      2nd
Kerberos, batch job authentication using      
Kerberos, integration in SSH      
Kerberos, OpenSSH and Tectia interoperability      
Kerberos, OpenSSH implementation      
Kerberos, server configuration for      
Kerberos, support in SSH      
Kerberos, tickets      
KerberosAuthentication keyword (OpenSSH)      
KerberosOrLocalPasswd keyword (OpenSSH)      
KerberosTgtPassing keyword (OpenSSH)      
KerberosTicketCleanup keyword      
Kermit      2nd
KEXINIT messages      
Key keyword (Tectia)      2nd
keyboard-interactive authentication      
keyboard-interactive authentication, one-time passwords      
keyboard-interactive authentication, Tectia plugin for      
KeyRegenerationInterval keyword      2nd
Keys      2nd 3rd 4th
keys, changing      
keys, host keys      2nd
keys, host keys, implementation dependency, SSH      
keys, key exchange      
keys, key generators      
keys, key management      
keys, key management, programs for key creation      
keys, key management, setup recommendations      
keys, key pairs      
keys, key-distribution problem      
keys, secrecy      
keys, session keys      
keys, Tectia external keys      
keys, troubleshooting      
keywords      
known hosts      
known hosts, known hosts mechanism      
known hosts, known-hosts databases      2nd
launch-sshd shell script      
LDAPServers keyword      2nd
limiting simultaneous connections      
Linux SSH implementations      
ListenAddress      
local computers, securing      
LocalForward keyword      2nd 3rd 4th 5th
LoginGraceTime keyword      2nd 3rd 4th
LogLevel keyword      2nd 3rd
lsh      
MAC (message authentication code)      2nd
Macintosh      
Macintosh, OpenSSH      
Macintosh, OpenSSH, SSH clients      
Macintosh, OpenSSH, SSH server      
Macintosh, SSH implementations      
Macs keyword      2nd 3rd
MacSFTP      
MacSSH      
man-in-the-middle attacks      2nd
Masquerading      
Maverick SSHD      
Maverick.NET      
MaxAuthTries keyword      
MaxBroadcastsPerSecond keyword      
MaxConnections keyword      
MaxStartups keyword      
MD5      
metaconfiguration      
MindTerm      
motd (message of the day)      
Nagle algorithm      
name service spoofing      
NAT (Network Address Translation)      
NAT, masquerading      
NAT, server-side issues      
netgroups      
network applications, security issues      
Network Information Service (NIS)      
network interface server settings      
networking terminology      
NEWKEYS      
NFS, recommended settings      
NiftyTelnet SSH      
NIS (Network Information Service)      
nmap      
no-agent-forwarding keyword      2nd 3rd 4th
no-port-forwarding keyword      2nd 3rd 4th 5th 6th 7th
no-pty keyword      2nd 3rd 4th 5th 6th 7th
no-X11-forwarding keyword      2nd 3rd
NoDelay keyword      2nd 3rd 4th 5th 6th
NoHostAuthenticationForLocalhost keyword      2nd
NumberOfPasswordPrompts keyword      2nd
one-time pad      
one-time passwords      2nd
OpenBSD      2nd
OpenBSD, SSH implementations      
OpenSSH      2nd 3rd
OpenSSH, account authorization files      
OpenSSH, authorization files      
OpenSSH, configuration      
OpenSSH, configuration, access control with TCP-wrappers      
OpenSSH, configuration, command-line flags      
OpenSSH, configuration, dependencies      
OpenSSH, configuration, file locations      
OpenSSH, configuration, Kerberos support      
OpenSSH, configuration, networking      
OpenSSH, configuration, PAM authentication      
OpenSSH, configuration, pid file      
OpenSSH, configuration, turning on support for Internet Protocol Version 4 (IPv4)
OpenSSH, conversion, SSH-1 to SSH-2 keys
OpenSSH, environment variables      
OpenSSH, help command      
OpenSSH, host access control      
OpenSSH, host keys implementation      
OpenSSH, identities      2nd
OpenSSH, installation      
OpenSSH, installation, build and install      
OpenSSH, installation, extraction of zipped files      
OpenSSH, installation, verification with PGP      
OpenSSH, Macintosh operation      
OpenSSH, Macintosh operation, SSH clients      
OpenSSH, Macintosh operation, SSH server      
OpenSSH, prerequisites      
OpenSSH, privilege separation      2nd
OpenSSH, public-key installation      
OpenSSH, quick reference      
OpenSSH, random number generation      
OpenSSH, random number storage      
OpenSSH, scp keywords      
OpenSSH, scp options      
OpenSSH, server configuration      
OpenSSH, server configuration, logging and debugging      
OpenSSH, server host-key generation      
OpenSSH, server protocol version string      
OpenSSH, serverwide configuration      
OpenSSH, serverwide configuration, authentication keywords      
OpenSSH, serverwide configuration, configuration files, checking      
OpenSSH, serverwide configuration, debugging messages      
OpenSSH, serverwide configuration, hostbased authentication      
OpenSSH, serverwide configuration, Kerberos authentication      
OpenSSH, serverwide configuration, password authentication      
OpenSSH, serverwide configuration, public-key authentication      
OpenSSH, serverwide configuration, recommended settings      
OpenSSH, serverwide configuration, reverse IP mapping      
OpenSSH, serverwide configuration, SSH protocol settings      
OpenSSH, serverwide configuration, user welcome      
OpenSSH, smartcard support      
OpenSSH, software inventory      
OpenSSH, SSH configuration directory, key storage file      
OpenSSH, ssh keywords      
OpenSSH, ssh options      
OpenSSH, SSH-1      
OpenSSH, ssh-add options      
OpenSSH, ssh-agent options      
OpenSSH, ssh-keygen options      
OpenSSH, sshd keywords      
OpenSSH, sshd options      
OpenSSH, SSH_ORIGINAL_COMMAND environment variable      
OpenSSH, subsystem command syntax      
OpenSSH, Version 4.0 new features      
OpenSSH, Version 4.0 new features, AddressFamily configuration keyword      
OpenSSH, Version 4.0 new features, clients      
OpenSSH, Version 4.0 new features, connection sharing      
OpenSSH, Version 4.0 new features, hostname hashing      
OpenSSH, Version 4.0 new features, KbdInteractiveDevices keyword      
OpenSSH, Version 4.0 new features, logging of access violations      
OpenSSH, Version 4.0 new features, password and account expiration warnings      
OpenSSH, Version 4.0 new features, port forwarding      
OpenSSH, Version 4.0 new features, server      
OpenSSH, Version 4.0 new features, sftp command line      
OpenSSH, Version 4.0 new features, ssh-keygen command-line options      
OpenSSH, Windows and Cygwin operation      2nd
OpenSSH, Windows and Cygwin operation, agents      
OpenSSH, Windows and Cygwin operation, Cygwin installation      
OpenSSH, Windows and Cygwin operation, opening remote windows      
OpenSSH, Windows and Cygwin operation, public-key authentication      
OpenSSH, Windows and Cygwin operation, ssh clients      
OpenSSH, Windows and Cygwin operation, SSH server setup      
OpenSSH, Windows and Cygwin operation, troubleshooting      
OpenSSL      2nd
OpenSSL, directory path, flagging      
Options keyword      2nd 3rd
OS/2 SSH implementations      
packet filters, stateful      
PalmOS SSH implementations      
PAM (pluggable authentication modules)      2nd
PAM, OpenSSH authentication      
PAM, serverwide configuration      
passive mode (FTP)      2nd
passive mode (FTP), firewalls and      
passive mode (FTP), PASV port theft problem      
passphrases      
passphrases, changing      
passphrases, limitations      
PasswdPath keyword (Tectia)      
password authentication      
password authentication, batch jobs, issues with      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте