Encryption Software and Books Encryption Software and Books
   Home >  Encryption Software >  Books > Cryptography


Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.




Bestselling and bargain books: Cryptography
* Search bestsellers
* Search bargain books
* Other books




   


Books -> Cryptography


SSH, The Secure Shell: The Definitive Guide

by:
Barrett, Daniel J.
Silverman, Richard



Publisher:
O'Reilly
Published: February 15, 2001
ISBN: 0596000111
Format:Paperback
Pages:540


   Read More, Buy It

Book Description
Amazon.com
The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, a.k.a. SSH (which isn't a true shell at all) provides your otherwise attack-prone utilities with the protection they need. SSH: The Secure Shell: The Definitive Guide explains how to use SSH at all levels. In a blended sequence, the book explains what SSH is all about, how it fits into a larger security scheme, and how to employ it as an everyday user with an SSH client. More technically detailed chapters show how to configure a SSH server--several variants are covered--and how to integrate SSH with non-Unix client platforms.

As befits its detail- and variation-rich subject, this book comprises many specialized sections, each dealing with some specific aspect of use or configuration (setting up access control at the account level, for example, or generating keys for a particular SSH server). The writing is both informative and fun to read; the authors switch back and forth between text and entry-and-response listings from SSH machines. They often run through a half-dozen or more variants on the same command in a few pages, providing the reader with lots of practical information. The discussion of how SSH fits into a Kerberos Public Key Infrastructure (PKI) is great, as is the advice on defeating particular kinds of attacks. --David Wall

Topics covered:

The Secure Shell (SSH) for installers, administrators, and everyday users
SSH design and operation
Server setup
SSH agents
Client configuration
Public Key Infrastructure (PKI) integration
SSH1
SSH2
F-Secure
OpenSSH for Unix
SSH1 and SecureCRT for Microsoft Windows
NiftyTelnet SSH for Mac OS



Product Description:
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well. SSH, The Secure Shell: The Definitive Guide covers SSH1, SSH2, and OpenSSH for Unix, plus Windows and Macintosh products. It shows you how to configure SSH servers and clients, both system-wide and per user; explains advanced key management using agents; and covers installing and maintaining SSH systems (with special tips for large data centers), forwarding (tunneling) of TCP and X11 applications, undocumented behaviors of popular SSH implementations, and how to troubleshoot a wide variety of common and not-so-common problems.


  Read More, Buy It




Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.