Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Next Generation SSH2 Implementation
Securing Data in Motion
1st Edition - November 12, 2008
Author: Dale Liu
Language: English
Paperback ISBN:9781597492836
9 7 8 - 1 - 5 9 7 4 9 - 2 8 3 - 6
eBook ISBN:9780080570006
9 7 8 - 0 - 0 8 - 0 5 7 0 0 0 - 6
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.
This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox
Network and systems administrators, IT security staff; security analysts and engineers
Acknowledgments Chapter 1: Introduction Chapter 2: OSI Model and Then Some Chapter 3: An Introduction to Cryptography Chapter 4: SSH Features Chapter 5: SSH Shortcomings Chapter 6: SSH Client Basics Chapter 7: The SSH Server Basics Chapter 8: SSH on Windows Chapter 9: Linux SSH Chapter 10: Mac SSH Chapter 11: SSH Command Line and Advanced Client Use Chapter 12: SSH Server Advanced Use Chapter 13: SSH Port Forwarding Index
No. of pages: 336
Language: English
Edition: 1
Published: November 12, 2008
Imprint: Syngress
Paperback ISBN: 9781597492836
eBook ISBN: 9780080570006
DL
Dale Liu
Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.
Affiliations and expertise
Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.
Read Next Generation SSH2 Implementation on ScienceDirect