Wiley.com
Print this page Share

Implementing SSH: Strategies for Optimizing the Secure Shell

ISBN: 978-0-471-45880-7
Paperback
402 pages
October 2003
Implementing SSH: Strategies for Optimizing the Secure Shell (0471458805) cover image
This title is out-of-print and not currently available for purchase from this site.

Acknowledgments.

About the Author.

Introduction.

Part 1: SSH Basics.

Chapter 1: Overview of SSH.

Chapter 2: SSH Servers.

Chapter 3: Secure Shell Clients.

Chapter 4: Authentication.

Chapter 5: SSH Management.

Part 2: Remote Access Solutions.

Chapter 6: SSH Port Forwarding.

Chapter 7: Secure Remote Access.

Part 3: Protocol Replacement.

Chapter 8: SSH Versatility.

Chapter 9: Proxy Technologies in a secure Web Environment.

Chapter 10: SSH Case Studies.

Epilogue.

Index.

Related Titles

Security

by Christos Douligeris, Dimitrios N. Serpanos
by Farooq Anjum, Petros Mouchtaris
by Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac
Back to Top