Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: SSH, The Secure Shell: The Definitive Guide

Авторы: Barrett D.J., Silverman R., Byrnes R.G.

Аннотация:

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

* Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
* Installing, configuring, and maintaining SSH (with special tips for large data centers).
* The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
* Application tunneling, port and agent forwarding, and forced commands.
* Undocumented features of popular SSH implementations.
* Detailed case studies of creating complex applications with SSH.
* Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.


Язык: ru

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 2nd edition

Год издания: 2005

Количество страниц: 645

Добавлена в каталог: 14.10.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
serverwide configuration, forwarding, X forwarding      
serverwide configuration, host-key generation      
serverwide configuration, initial setup      
serverwide configuration, initial setup, data compression      
serverwide configuration, initial setup, encryption algorithms      
serverwide configuration, initial setup, integrity-checking (MAC) algorithms      
serverwide configuration, initial setup, key regeneration      
serverwide configuration, initial setup, numeric values, configuration files      
serverwide configuration, initial setup, protocol version string      
serverwide configuration, initial setup, restart for each connection      
serverwide configuration, initial setup, SSH protocol settings      
serverwide configuration, logging and debugging      
serverwide configuration, logging and debugging, syslog      
serverwide configuration, making changes      
serverwide configuration, metaconfiguration information      2nd
serverwide configuration, port forwarding      
serverwide configuration, port selection      
serverwide configuration, reconfiguration example      
serverwide configuration, server compatibility, SSH-1 and SSH-2
serverwide configuration, setup recommendations      
serverwide configuration, startup file script      
serverwide configuration, subconfiguration files      
serverwide configuration, subsystems      
serverwide configuration, subsystems, definition syntax      
serverwide configuration, troubleshooting      
serverwide configuration, user logins and accounts      
serverwide configuration, user logins and accounts, client environment variables, setting permissions      
serverwide configuration, user logins and accounts, initialization scripts      
serverwide configuration, user logins and accounts, user welcome messages      
serverwide configuration, xv      2nd
session keys      
Sessions      
sessions, identity-based tailoring      
SetRemoteEnv keyword (Tectia)      
SetRemoteEnv keyword (Tectia), server settings and      
SettableEnvironmentVars keyword (Tectia)      
setup recommendations      
setup recommendations, client configuration      
setup recommendations, compile-time configuration      
setup recommendations, key management      
setup recommendations, per-account configuration      
setup recommendations, remote home directories      
setup recommendations, serverwide configuration      
SFTP      2nd 3rd 4th
sftp, ASCII vs. binary transfer      
sftp, command-line options      2nd
sftp, Cygwin under Windows      
sftp, interactive commands      
sftp, Macintosh      
sftp, vs. ftp      
SftpSysLogFacility keyword      2nd
SHA-1 (Secure Hash Algorithm)      
shadow files      
Shannon, Claude      
shell channel request      
SHELL environment variable      
shell escapes      
ShellGuard      
SIGHUP signal      
signers      
single-shell agent invocation      
SkeyAuthentication keyword      
slogin (SSH1)      
SmartcardDevice keyword      
SMTP (Simple Mail Transfer Protocol)      
sniffing      
SocksServer keyword      2nd 3rd 4th 5th 6th
source distributions      
SRP (Secure Remote Password)      
ssh (client)      
ssh (client), configuration      
ssh (client), configuration, authentication      
ssh (client), configuration, command-line options      
ssh (client), configuration, configuration files      
ssh (client), configuration, connections      
ssh (client), configuration, data compression      
ssh (client), configuration, encryption algorithms      
ssh (client), configuration, environment variables      
ssh (client), configuration, forwarding      
ssh (client), configuration, host key types      
ssh (client), configuration, host keys and known-hosts databases      
ssh (client), configuration, integrity-checking (MAC) algorithms      
ssh (client), configuration, logging and debugging      
ssh (client), configuration, precedence      
ssh (client), configuration, protocol settings      
ssh (client), configuration, proxies      2nd
ssh (client), configuration, random seeds (Tectia)      
ssh (client), configuration, remote account name      
ssh (client), configuration, session rekeying      
ssh (client), configuration, SOCKS      
ssh (client), configuration, subsystems      
ssh (client), configuration, TCP/IP settings      
ssh (client), configuration, user identities      
ssh (client), Cygwin under Windows      
ssh (client), debugging messages      
ssh (client), escape character      
ssh (client), keywords      
ssh (client), known and unknown hosts      
ssh (client), Macintosh      
ssh (client), remote terminal sessions      
ssh (client), remote terminal sessions, client/server channel, establishing      
ssh (client), remote terminal sessions, login      
ssh (client), ssh options      
ssh (client), ssh-add options      
ssh (client), ssh-agent options      
ssh (client), ssh-keygen options      
ssh (client), troubleshooting      
ssh (client), unexpected behaviors, handling      
ssh (client), verbose mode      2nd
SSH (protocol)      
SSH (protocol), quick reference      
SSH (Secure Shell)      
SSH (Secure Shell), address name with multiple numeric address, problems      
SSH (Secure Shell), algorithms      
SSH (Secure Shell), algorithms, hash functions      
SSH (Secure Shell), algorithms, public-key algorithms      
SSH (Secure Shell), algorithms, secret-key algorithms      
SSH (Secure Shell), authentication      
SSH (Secure Shell), authentication, supported methodologies      
SSH (Secure Shell), authorization      
SSH (Secure Shell), authorization in hostbased authentication      
SSH (Secure Shell), authorization in hostbased authentication, control file details      
SSH (Secure Shell), authorization in hostbased authentication, hostbased access files      
SSH (Secure Shell), authorization in hostbased authentication, netgroups      
SSH (Secure Shell), authorization in hostbased authentication, netgroups as wildcards      
SSH (Secure Shell), backward compatibility      
SSH (Secure Shell), client/server architecture      
SSH (secure shell), clients      2nd
SSH (Secure Shell), clients, slogin      
SSH (Secure Shell), compression algorithms      
SSH (Secure Shell), configuration directory      
SSH (Secure Shell), configuration directory, key storage files      
SSH (Secure Shell), denotation of protocols, products and clients      
SSH (Secure Shell), features      2nd
SSH (Secure Shell), features, keys and agents      
SSH (Secure Shell), features, port forwarding      
SSH (Secure Shell), features, remote commands execution      
SSH (Secure Shell), features, remote logins      
SSH (Secure Shell), features, secure file transfers      
SSH (Secure Shell), file transfers      
SSH (Secure Shell), flexibility in prosecution of services      
SSH (Secure Shell), forwarding      
SSH (Secure Shell), forwarding, supported types      
SSH (Secure Shell), function and purpose      
SSH (Secure Shell), history      
SSH (Secure Shell), implementation-dependent features      2nd
SSH (Secure Shell), implementation-dependent features, host keys      
SSH (Secure Shell), included component protocols      
SSH (Secure Shell), integrity      
SSH (Secure Shell), keys      
SSH (Secure Shell), known-hosts mechanism      
SSH (Secure Shell), PKI, supported types and supporting implementations      
SSH (Secure Shell), privacy      
SSH (Secure Shell), privilege separation (OpenSSH)      
SSH (Secure Shell), pronunciation      
SSH (Secure Shell), protections provided by      
SSH (Secure Shell), r-commands, replacing      
SSH (Secure Shell), r-commands, replacing in CVS      
SSH (Secure Shell), r-commands, replacing in GNU Emacs      
SSH (Secure Shell), r-commands, replacing in Pine      
SSH (Secure Shell), r-commands, replacing in rsync and rdist      
SSH (Secure Shell), random number generation      
SSH (Secure Shell), related technologies      
SSH (Secure Shell), related technologies, firewalls      
SSH (Secure Shell), related technologies, IPSEC and VPNs      
SSH (Secure Shell), related technologies, Kerberos      
SSH (Secure Shell), related technologies, PGP and GnuPG      
SSH (Secure Shell), related technologies, SRP      
SSH (Secure Shell), related technologies, SSL      
SSH (Secure Shell), related technologies, SSL-enhanced telnet and FTP      
SSH (Secure Shell), related technologies, stunnel      
SSH (Secure Shell), security vulnerabilities      
SSH (Secure Shell), server      
SSH (Secure Shell), sessions      
SSH (Secure Shell), software inventory      
SSH (Secure Shell), SSH-1      2nd
SSH (Secure Shell), SSH-1 protocol
SSH (Secure Shell), SSH-1, Tectia compatibility support      
SSH (Secure Shell), SSH-2      2nd
SSH (Secure Shell), SSH-2 protocol
SSH (Secure Shell), SSH-2, SSH-1 compared to
SSH (Secure Shell), SSH-AUTH      2nd
SSH (Secure Shell), SSH-AUTH, "none" request
SSH (Secure Shell), SSH-AUTH, authentication request      
SSH (Secure Shell), SSH-AUTH, authentication response      
SSH (Secure Shell), SSH-AUTH, host-based authentication      
SSH (Secure Shell), SSH-AUTH, password authentication      
SSH (Secure Shell), SSH-AUTH, public-key authentication      
SSH (Secure Shell), SSH-CONN      2nd
SSH (Secure Shell), SSH-CONN, channel requests      
SSH (Secure Shell), SSH-CONN, channels      
SSH (Secure Shell), SSH-CONN, completing the connection process      
SSH (Secure Shell), SSH-CONN, global requests      
SSH (Secure Shell), SSH-CONN, requests      
SSH (Secure Shell), SSH-SFTP      
SSH (Secure Shell), SSH-TRANS      2nd
SSH (Secure Shell), SSH-TRANS, connection      
SSH (Secure Shell), SSH-TRANS, initialization of encryption      
SSH (Secure Shell), SSH-TRANS, key exchange algorithm      
SSH (Secure Shell), SSH-TRANS, key exchange and server authentication      
SSH (Secure Shell), SSH-TRANS, message authentication code and algorithms      
SSH (Secure Shell), SSH-TRANS, parameter negotiation      
SSH (Secure Shell), SSH-TRANS, protocol version selection      
SSH (Secure Shell), SSH-TRANS, server authentication and anti-spoofing      
SSH (Secure Shell), supported encryption algorithms      
SSH (Secure Shell), system architecture      
SSH (Secure Shell), xii      2nd
SSH Communications Security      2nd
ssh-add command      2nd
ssh-add command, command-line options      
ssh-add command, listing keys      
ssh-add command, reading input      
ssh-add command, troubleshooting      
ssh-agent command      
ssh-agent command, locking agents form unauthorized use      
ssh-agent command, troubleshooting      
ssh-askpass program      
ssh-askpass program, password piping      
ssh-copy-id command (for key installation)      
ssh-keyconverter (OpenSSH)      
ssh-keygen command      2nd
ssh-keygen command, command line options to change passphrases      
ssh-probe program (Tectia)      
ssh.pid file, path specification      
SSH1 product      
Ssh1AgentCompatibility keyword      2nd
Ssh1Compatibility keyword      2nd 3rd 4th 5th
Ssh1InternalEmulation keyword      2nd
Ssh1MaskPasswordLength keyword      2nd
Ssh1Path keyword      2nd
sshd (server)      
sshd (server), authentication syntax      
sshd (server), client environment variables and      
sshd (server), command-line options      
sshd (server), debugging messages      
sshd (server), hushlogin and      
sshd (server), inetd      
sshd (server), initialization scripts      
sshd (server), key regeneration      
sshd (server), keywords      
sshd (server), launch-sshd shell script      
sshd (server), public keys file      
sshd (server), running as ordinary user      
sshd (server), running as ordinary user, disadvantages      
sshd (server), running as superuser      
sshd (server), setup recommendations      
sshd (server), SIGHUP signal      
sshd (server), sshd command options      
sshd (server), user SSH directory      
sshd (server), user welcome messages      
sshd (server), xinetd      
sshd-check-conf program      2nd
Sshd1ConfigFile keyword      2nd 3rd 4th
Sshd1Path keyword      2nd 3rd 4th
sshrc files      
sshregex (Tectia) manpage      
sshregex (Tectia) manpage, egrep patterns      
sshregex (Tectia) manpage, syntax      
sshregex (Tectia) manpage, ZSH_FILEGLOB      
SshSignerPath keyword      2nd
SSHTerm Professional      
SSL (Secure Socket Layers)      
SSL (Secure Socket Layers), TCP-based applications, enhanced with      
StrictHostKeyChecking keyword      2nd 3rd 4th
StrictModes keyword      2nd 3rd 4th 5th 6th
stunnel      
subconfiguration files      
subconfiguration files, forbidden keywords      
subconfiguration files, keyword order      
subconfiguration files, sections      
subshell agent invocation      
subsystem channel request      
Subsystem keyword      
symbolic links, created by SSH installations      
symmetric ciphers      
SYN flood attack      
SyslogFacility keyword      
tar format      
TCP attacks      
TCP-wrappers      
TCP/IP settings, server      
TCP/IP settings, server, ASLR (Address Space Layout Randomization)      
TCP/IP settings, server, failed logins      
TCP/IP settings, server, idle connections      
TCP/IP settings, server, invocation by inetd or xinetd      
TCP/IP settings, server, keepalive messages      
TCP/IP settings, server, Nagle Algorithm      
TCP/IP settings, server, port number and network interface      
TCP/IP settings, server, reverse IP mappings      
TCP/IP settings, server, server discovery      
TCP/IP settings, server, simultaneous connections, limiting      
tcpip-forward request      
TCPKeepAlive keyword      
TCP_NODELAY bit      
Tectia      2nd
Tectia for Windows      
Tectia for Windows, Accession Lite      
Tectia for Windows, client application      
Tectia for Windows, client application, configuration and profiles      
Tectia for Windows, command-line programs      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте