Implementing SSH: Strategies for Optimizing the Secure Shell
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
More About This Title Implementing SSH: Strategies for Optimizing the Secure Shell
- English
English
HIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment.
- English
English
Acknowledgments.
About the Author.
Introduction.
Part 1: SSH Basics.
Chapter 1: Overview of SSH.
Chapter 2: SSH Servers.
Chapter 3: Secure Shell Clients.
Chapter 4: Authentication.
Chapter 5: SSH Management.
Part 2: Remote Access Solutions.
Chapter 6: SSH Port Forwarding.
Chapter 7: Secure Remote Access.
Part 3: Protocol Replacement.
Chapter 8: SSH Versatility.
Chapter 9: Proxy Technologies in a secure Web Environment.
Chapter 10: SSH Case Studies.
Epilogue.
Index.