Implementing SSH: Strategies for Optimizing the Secure Shell
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Implementing SSH: Strategies for Optimizing the Secure Shell

English

HIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment.

English

Acknowledgments.

About the Author.

Introduction.

Part 1: SSH Basics.

Chapter 1: Overview of SSH.

Chapter 2: SSH Servers.

Chapter 3: Secure Shell Clients.

Chapter 4: Authentication.

Chapter 5: SSH Management.

Part 2: Remote Access Solutions.

Chapter 6: SSH Port Forwarding.

Chapter 7: Secure Remote Access.

Part 3: Protocol Replacement.

Chapter 8: SSH Versatility.

Chapter 9: Proxy Technologies in a secure Web Environment.

Chapter 10: SSH Case Studies.

Epilogue.

Index.

loading