Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
gateway hosts, case study, SSH connection, making      
gateway hosts, case study, tunnelled SSH withProxyCommand      
GatewayPorts keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
GlobalKnownHostsFile keyword      
GNU Emacs and SSH
GnuPG (Gnu Privacy Guard)
GoBackground keyword      2nd
gPutty      
group access control      
GSSAPI
GSSAPI.AllowedMethods keyword (Tectia)      
GSSAPI.AllowOldMethodWhichIsInsecure keyword      2nd 3rd
GSSAPI.DelegateToken keyword
GSSAPI.Dlls keyword (Tectia)
GSSAPIAuthentication keyword (OpenSSH)      
GSSAPICleanupCredentials keyword      2nd
GSSAPIDelegateCredentials keyword      
gzip and gunzip      
hash functions      2nd
hash functions, collision-resistance and pre-image-resistance
HOME environment variable
host keys      2nd
host keys, implementation dependency, SSH      
Host keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
host-key generation      
hostbased authentication
hostbased authentication, batch jobs and      
hostbased authentication, per-account configuration and
hostbased authentication, security of
hostbased authentication, server configuration for
hostbased authentication, troubleshooting      
HostbasedAuthentication keyword (OpenSSH)      
HostbasedAuthForceClientHostnameDNSMatch keyword      2nd 3rd
HostCa keyword      2nd
HostCAMoCRLs keyword      2nd
HostCertificateFile keyword      2nd 3rd
HostKey keyword      2nd
HostKeyAlgorithms keyword      2nd
HostKeyAlias keyword      2nd 3rd 4th
HostKeyEkInitString keyword      2nd
HostKeyEkProvider keyword      
HostKeyEkTimeOut keyword      2nd
HostKeyFile keyword      2nd 3rd
HostName keyword      2nd 3rd
Hosts
HostSpecificConfig keyword (Tectia)      
hostspecs      
IDEA (International Data Encryption Algorithm)      
identification files (Tectia)      
identities      2nd
identities, creating
identities, creating, Diffie-Hellman key exchange, group generation
identities, default identity
identities, listing and deleting
identities, manual switching
identities, multiple identities
identities, OpenSSH
identities, switching with agents
identities, tailored sessions
identities, Tectia
IdentitiesOnly keyword      2nd
IdentityFile keyword      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
IdKey keyword      2nd
idle-timeout keyword      2nd 3rd 4th
IdleTimeout keyword      
IdPgpKeyFingerprint keyword      2nd
IdPgpKeyId keyword      2nd
IdPgpKeyName keyword      2nd
IgnoreLoginRestrictions.PasswordExpiration keyword      
IgnoreLoginRestrictions.Rlogin.AIX keyword
IgnoreRhosts keyword      2nd 3rd 4th 5th 6th 7th 8th
IgnoreRootRhosts keyword (Tectia)
IgnoreUserKnownHosts keyword (OpenSSH)      
IMAP (Internet Message Access Protocol)
IMAP, authentication
inetd
inetd, server configuration and debugging
inetd, server invocation using
initialization scripts, SSH servers
Installation
installation, on Unix systems
installation, prerequisites
installation, signature verification
installation, software inventory, table
installation, source code
installation, source files
installation, source files, extraction
installation, symbolic links created during
installation, Unix implementations
installation, Unix implementations, binary distributions
Integrity      
Integrity checking      2nd
interactive sessions, authentication without passwords
IP attacks
IP spoofing
IPSEC (Internet Protocol Security)
J2SSH Maverick
Java SSH implementations
JavaSSH
JSch
kadmin command
KDC (Key Distribution Center)
KeepAlive keyword
keepalive messages
Kerberos      2nd
Kerberos, batch job authentication using
Kerberos, integration in SSH
Kerberos, OpenSSH and Tectia interoperability
Kerberos, OpenSSH implementation
Kerberos, server configuration for
Kerberos, support in SSH
Kerberos, tickets
KerberosAuthentication keyword (OpenSSH)
KerberosOrLocalPasswd keyword (OpenSSH)
KerberosTgtPassing keyword (OpenSSH)
KerberosTicketCleanup keyword
Kermit      2nd
KEXINIT messages      
Key keyword (Tectia)      2nd
keyboard-interactive authentication
keyboard-interactive authentication, one-time passwords
keyboard-interactive authentication, Tectia plugin for
KeyRegenerationInterval keyword      2nd
Keys      2nd 3rd 4th
keys, changing
keys, host keys      2nd
keys, host keys, implementation dependency, SSH
keys, key exchange
keys, key generators
keys, key management
keys, key management, programs for key creation
keys, key management, setup recommendations
keys, key pairs
keys, key-distribution problem      
keys, secrecy
keys, session keys
keys, Tectia external keys
keys, troubleshooting
keywords
known hosts      
known hosts, known hosts mechanism
known hosts, known-hosts databases      2nd
launch-sshd shell script      
LDAPServers keyword      2nd
limiting simultaneous connections
Linux SSH implementations      
ListenAddress      
local computers, securing      
LocalForward keyword      2nd 3rd 4th 5th
LoginGraceTime keyword      2nd 3rd 4th
LogLevel keyword      2nd 3rd
lsh
MAC (message authentication code)      2nd
Macintosh      
Macintosh, OpenSSH
Macintosh, OpenSSH, SSH clients
Macintosh, OpenSSH, SSH server
Macintosh, SSH implementations
Macs keyword      2nd 3rd
MacSFTP
MacSSH
man-in-the-middle attacks      2nd
Masquerading      
Maverick SSHD
Maverick.NET
MaxAuthTries keyword
MaxBroadcastsPerSecond keyword
MaxConnections keyword
MaxStartups keyword
MD5
metaconfiguration
MindTerm
motd (message of the day)      
Nagle algorithm      
name service spoofing      
NAT (Network Address Translation)      
NAT, masquerading      
NAT, server-side issues
netgroups
network applications, security issues      
Network Information Service (NIS)
network interface server settings
networking terminology
NEWKEYS
NFS, recommended settings      
NiftyTelnet SSH
NIS (Network Information Service)      
nmap
no-agent-forwarding keyword      2nd 3rd 4th
no-port-forwarding keyword      2nd 3rd 4th 5th 6th 7th
no-pty keyword      2nd 3rd 4th 5th 6th 7th
no-X11-forwarding keyword      2nd 3rd
NoDelay keyword      2nd 3rd 4th 5th 6th
NoHostAuthenticationForLocalhost keyword      2nd
NumberOfPasswordPrompts keyword      2nd
one-time pad
one-time passwords      2nd
OpenBSD      2nd
OpenBSD, SSH implementations
OpenSSH      2nd 3rd
OpenSSH, account authorization files      
OpenSSH, authorization files
OpenSSH, configuration
OpenSSH, configuration, access control with TCP-wrappers
OpenSSH, configuration, command-line flags
OpenSSH, configuration, dependencies
OpenSSH, configuration, file locations
OpenSSH, configuration, Kerberos support
OpenSSH, configuration, networking
OpenSSH, configuration, PAM authentication
OpenSSH, configuration, pid file      
OpenSSH, configuration, turning on support for Internet Protocol Version 4 (IPv4)
OpenSSH, conversion, SSH-1 to SSH-2 keys
OpenSSH, environment variables
OpenSSH, help command      
OpenSSH, host access control      
OpenSSH, host keys implementation
OpenSSH, identities      2nd
OpenSSH, installation
OpenSSH, installation, build and install
OpenSSH, installation, extraction of zipped files
OpenSSH, installation, verification with PGP
OpenSSH, Macintosh operation      
OpenSSH, Macintosh operation, SSH clients      
OpenSSH, Macintosh operation, SSH server
OpenSSH, prerequisites
OpenSSH, privilege separation      2nd
OpenSSH, public-key installation
OpenSSH, quick reference      
OpenSSH, random number generation
OpenSSH, random number storage
OpenSSH, scp keywords
OpenSSH, scp options
OpenSSH, server configuration      
OpenSSH, server configuration, logging and debugging
OpenSSH, server host-key generation
OpenSSH, server protocol version string
OpenSSH, serverwide configuration
OpenSSH, serverwide configuration, authentication keywords      
OpenSSH, serverwide configuration, configuration files, checking
OpenSSH, serverwide configuration, debugging messages
OpenSSH, serverwide configuration, hostbased authentication
OpenSSH, serverwide configuration, Kerberos authentication
OpenSSH, serverwide configuration, password authentication
OpenSSH, serverwide configuration, public-key authentication
OpenSSH, serverwide configuration, recommended settings      
OpenSSH, serverwide configuration, reverse IP mapping
OpenSSH, serverwide configuration, SSH protocol settings
OpenSSH, serverwide configuration, user welcome
OpenSSH, smartcard support      
OpenSSH, software inventory      
OpenSSH, SSH configuration directory, key storage file      
OpenSSH, ssh keywords      
OpenSSH, ssh options      
OpenSSH, SSH-1      
OpenSSH, ssh-add options      
OpenSSH, ssh-agent options
OpenSSH, ssh-keygen options      
OpenSSH, sshd keywords      
OpenSSH, sshd options      
OpenSSH, SSH_ORIGINAL_COMMAND environment variable      
OpenSSH, subsystem command syntax      
OpenSSH, Version 4.0 new features      
OpenSSH, Version 4.0 new features, AddressFamily configuration keyword      
OpenSSH, Version 4.0 new features, clients      
OpenSSH, Version 4.0 new features, connection sharing
OpenSSH, Version 4.0 new features, hostname hashing
OpenSSH, Version 4.0 new features, KbdInteractiveDevices keyword
OpenSSH, Version 4.0 new features, logging of access violations
OpenSSH, Version 4.0 new features, password and account expiration warnings      
OpenSSH, Version 4.0 new features, port forwarding      
OpenSSH, Version 4.0 new features, server
OpenSSH, Version 4.0 new features, sftp command line
OpenSSH, Version 4.0 new features, ssh-keygen command-line options      
OpenSSH, Windows and Cygwin operation      2nd
OpenSSH, Windows and Cygwin operation, agents      
OpenSSH, Windows and Cygwin operation, Cygwin installation
OpenSSH, Windows and Cygwin operation, opening remote windows
OpenSSH, Windows and Cygwin operation, public-key authentication      
OpenSSH, Windows and Cygwin operation, ssh clients
OpenSSH, Windows and Cygwin operation, SSH server setup
OpenSSH, Windows and Cygwin operation, troubleshooting
OpenSSL      2nd
OpenSSL, directory path, flagging
Options keyword      2nd 3rd
OS/2 SSH implementations
packet filters, stateful
PalmOS SSH implementations
PAM (pluggable authentication modules)      2nd
PAM, OpenSSH authentication
PAM, serverwide configuration
passive mode (FTP)      2nd
passive mode (FTP), firewalls and      
passive mode (FTP), PASV port theft problem
passphrases
passphrases, changing
passphrases, limitations
PasswdPath keyword (Tectia)
password authentication
password authentication, batch jobs, issues with      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте