Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
password authentication, empty passwords      
password authentication, expired passwords      
password authentication, failed password attempts      
password authentication, troubleshooting      
password cracking attacks      
PasswordAuthentication keyword      2nd 3rd 4th 5th 6th 7th 8th 9th
PasswordExpireWarningDays keyword      
PasswordGuesses keyword (Tectia)      2nd
PasswordPrompt keyword      2nd
Passwords      
passwords, one-time passwords      
passwords, security risks      
PenguiNet      
per-account configuration      2nd
per-account configuration, advantages      
per-account configuration, authentication      
per-account configuration, authentication, access restriction by host or domain      
per-account configuration, authentication, forced commands      
per-account configuration, authentication, OpenSSH authorization files      
per-account configuration, authentication, public-key based configuration      
per-account configuration, authentication, Tectia authorization files      
per-account configuration, environment variables, setting      
per-account configuration, forwarding, disabling, or limiting      
per-account configuration, hostbased access control      
per-account configuration, idle-timeout option, setting (Tectia)      
per-account configuration, limitations      
per-account configuration, setup recommendations      
per-account configuration, troubleshooting      
per-account configuration, TTY allocation, disabling      
per-account configuration, user's rc file      
Perl modules for SSH implementation      
PermitEmptyPasswords keyword      
permitopen keyword      
PermitUserEnvironment keyword      
PGP (Pretty Good Privacy)      
PGP, authentication in Tectia      
PgpKeyFingerprint keyword      2nd 3rd
PgpKeyId keyword      2nd 3rd
PgpKeyName keyword      2nd 3rd
PgpPublicKeyFile keyword      2nd
PgpSecretKeyFile keyword      2nd
PidFile keyword      2nd 3rd
Pine email client      2nd
Pine email client, connection scripts      
Pine email client, mail relaying      
Pine email client, remote usernames and      
PKI (Public Key Infrastructure)      2nd
Plaintext      
PocketPuTTY      
PocketTTY      
port forwarding      2nd 3rd
port forwarding, dynamic port forwarding      
port forwarding, firewalls, bypassing      
port forwarding, forwarding off-host      
port forwarding, ftp protocol forwarding      
port forwarding, listening port number      
port forwarding, local forwarding      
port forwarding, local forwarding, gateway ports      
port forwarding, local forwarding, remote forwarding, compared to      
port forwarding, multiple connection issues      
port forwarding, remote forwarding      
port forwarding, remote logins, without      
port forwarding, server configuration      2nd
port forwarding, target forwarding address, choosing      
port forwarding, termination      
port forwarding, termination, TIME_WAIT problem      
port forwarding, troubleshooting      
Port keyword      
port number      
port number, server settings      
Pragma Fortress      
PreferredAuthentications keyword      2nd
PrintLastLog keyword (OpenSSH)      
PrintMotd keyword      2nd 3rd 4th
Privacy      
Private keys      
privilege separation, issues with      
privileged ports      
PRNGs (pseudo-random number generators      
Protocol keyword (OpenSSH)      
Protocols      
ProxyCommand keyword      2nd 3rd 4th 5th
ProxyServer keyword      2nd
pseudo-random number generators (PRNGs)      
pSSH      
pty-req channel request      
PubKeyAuthentication keyword (OpenSSH)      
public key files      
Public key infrastructure (PKI)      
public-key authentication      
public-key authentication, algorithms      
public-key authentication, authenticator      
public-key authentication, batch jobs      
public-key authentication, batch jobs, agents      
public-key authentication, batch jobs, filesystem passphrases storage      
public-key authentication, batch jobs, plaintext keys      
public-key authentication, client/server interaction      
public-key authentication, key pair generation      
public-key authentication, keys, changing      
public-key authentication, keys, changing, OpenSSH      
public-key authentication, keys, changing, Tectia systems      
public-key authentication, password authentication, compared to      
public-key authentication, private keys      
public-key authentication, public keys      2nd
public-key authentication, public keys, installing in remote accounts      
public-key authentication, public keys, OpenSSH installation      
public-key authentication, public keys, Tectia systems, installation      
public-key authentication, server configuration for      
public-key authentication, Tectia systems, key generation on      
public-key authentication, troubleshooting      
Public-key cryptography      
PublicHostKeyFile keyword      2nd 3rd
PuTTY      2nd 3rd
PuTTY, batch jobs      
PuTTY, configuration and settings      
PuTTY, configuration and settings, authentication      
PuTTY, configuration and settings, compression      
PuTTY, configuration and settings, encryption algorithms      
PuTTY, configuration and settings, logging and debugging      
PuTTY, configuration and settings, Proxies and SOCKS      
PuTTY, configuration and settings, pseudo-terminal allocation      
PuTTY, configuration and use      
PuTTY, configuration and use, host keys      
PuTTY, configuration and use, saved sessions      
PuTTY, configuration and use, SSH protocol selection      
PuTTY, configuration and use, TCP/IP settings      
PuTTY, file transfers      
PuTTY, file transfers, PSCP      
PuTTY, file transfers, PSFTP      
PuTTY, forwarding      
PuTTY, installation      
PuTTY, key management      
PuTTY, key management, agents      
PuTTY, key management, key selection      
PuTTY, Plink console client      
PuTTY, remote commands      
PuTTY, TCP/IP settings      
PuTTY, TCP/IP settings, keepalive messages      
PuTTY, TCP/IP settings, Nagle algorithm      
PuTTY, TCP/IP settings, remote port selection      
QuietMode keyword      2nd 3rd 4th 5th
r-commands      
r-commands, disabling      
r-commands, insecurity      
r-commands, SSH, replacing with      
r-commands, SSH, replacing with, in CVS      
r-commands, SSH, replacing with, in GNU Emacs      
r-commands, SSH, replacing with, in Pine      
r-commands, SSH, replacing with, in rsync and rdist      
random number generation      
random number generation, OpenSSH      
random seed      
RandomSeed keyword      
RandomSeedFile keyword      2nd 3rd 4th
RC4 (ARCFOUR)      
rcp      
rdist      
realms      
regex syntax, SSH patterns (Tectia)      
regex syntax, SSH patterns (Tectia), character sets      
regex syntax, SSH patterns (Tectia), escaped tokens      
regular expressions manpage (Tectia)      
regular expressions manpage (Tectia), egrep patterns      
regular expressions manpage (Tectia), ZSH_FILEGLOB      
RekeyIntervalSeconds keyword      2nd 3rd 4th 5th 6th
remote account name      
remote program invocation and security      
RemoteForward keyword      2nd 3rd 4th
RemotelyAnywhere      
replay attacks      
Requests      
RequiredAuthentications keyword (Tectia)      
RequiredAuthentications keyword (Tectia), gssapi      
RequiredAuthentications keyword (Tectia), hostbased      
RequiredAuthentications keyword (Tectia), keyboard interactive      
RequireReverseMapping keyword      2nd 3rd 4th 5th
ResolveClientHostName keyword      2nd 3rd
restricted shell      
reverse IP mappings in server configuration      
RhostsRSAAuthentication keyword      2nd 3rd 4th 5th 6th
RIPEMD-160      
RPM packages      
RSA (Rivest-Shamir-Adleman) public-key algorithm      
RSAAuthentication keyword      2nd 3rd 4th 5th 6th
rsh (restricted shell)      
rsh suite      
rsync      
S/Key in OpenSSH      
ScanSSH program      
scp (Secure Copy Program)      2nd 3rd 4th 5th
scp, authentication through local agents      
scp, bandwidth settings      
scp, batch mode      
scp, Cygwin under Windows      
scp, data compression      
scp, directories, recursive copying      
scp, double-remote copying using agents      
scp, encryption algorithms, setting      
scp, file conversions      
scp, file transfers      
scp, forced commands and      
scp, gateway hosts, using through      
scp, help      
scp, internal options      
scp, keywords      
scp, Macintosh      
scp, optimization      
scp, options      
scp, original file, automatic removal (Tectia)      
scp, permissions      
scp, safety features      
scp, ssh executable, locating      
scp, SSH protocol settings      
scp, statistics, display of      
scp, syntax      2nd
scp, TCP/IP settings      
scp, troubleshooting      
scp, user identity      
scp, wildcards      
scp2      2nd
sealed servers      
SecPanel      
secret-key algorithms      
secret-key cryptography      
SECSH (Secure Shell) working group      
secure file transfers      
Secure iXplorer      
Secure KoalaTerm      
secure remote logins      
Secure Socket Layers (SSL)      
SecureCRT      2nd
SecureCRT, client configuration and use      
SecureCRT, command-line programs      
SecureCRT, file transfers      
SecureCRT, file transfers, vcp and vsftp commands      
SecureCRT, file transfers, Zmodem over SSH      
SecureCRT, forwarding      
SecureCRT, forwarding, port forwarding      
SecureCRT, forwarding, X forwarding      
SecureCRT, key management      
SecureCRT, key management, agents      
SecureCRT, key management, key generation      
SecureCRT, key management, key installation, automatic      
SecureCRT, key management, key installation, manual      
SecureCRT, key management, multiple identities      
SecureCRT, session configuration      
SecureCRT, troubleshooting      
SecureFX      
SecurID      
SecurIdGuesses keyword (Tectia)      
Security      
security, agent forwarding and untrusted machines      
security, batch job precautions      
security, carelessness and      
security, compile-time configuration setup recommendations      
security, forced commands and      
security, forwarding and      
security, multiple identities, advantages      
security, network applications and      
security, shell escapes and      
security, Tectia SSH-1 compatibility mode issues
SendEnv keyword      2nd 3rd
SendEnv keyword, server settings and      
server authentication      
ServerAliveCountMax keyword      2nd 3rd
ServerAliveInterval keyword      2nd 3rd
ServerKeyBits keyword      2nd
serverwide configuration      
serverwide configuration, access control      
serverwide configuration, access control, account access control      
serverwide configuration, access control, chroot, restricting directory access with      
serverwide configuration, access control, external access control      
serverwide configuration, access control, group access control      
serverwide configuration, access control, hostname access control      
serverwide configuration, access control, root access control      
serverwide configuration, access control, shosts access control      
serverwide configuration, authentication      
serverwide configuration, authentication, authentication syntax      
serverwide configuration, authentication, hostbased authentication      
serverwide configuration, authentication, Kerberos      
serverwide configuration, authentication, keyboard-interactive authentication      
serverwide configuration, authentication, login programs, selecting      
serverwide configuration, authentication, PAM      
serverwide configuration, authentication, password authentication      
serverwide configuration, authentication, PGP      
serverwide configuration, authentication, public-key authentication      
serverwide configuration, configuration files      
serverwide configuration, configuration files, checking      
serverwide configuration, configuration files, time values in      
serverwide configuration, file locations      
serverwide configuration, file locations, host-key files      
serverwide configuration, file locations, per-account authorization files      
serverwide configuration, file locations, process ID file      
serverwide configuration, file locations, random seed file      
serverwide configuration, file locations, server configuration files      
serverwide configuration, file locations, utmp file structure      
serverwide configuration, file permissions      
serverwide configuration, forwarding      
serverwide configuration, forwarding, agent forwarding      
serverwide configuration, forwarding, port forwarding      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru Hosted by Parkline.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте