Next Generation SSH2 Implementation book cover

Next Generation SSH2 Implementation

Securing Data in Motion

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

Audience
Network and systems administrators, IT security staff; security analysts and engineers

Paperback, 336 Pages

Published: November 2008

Imprint: Syngress

ISBN: 978-1-59749-283-6

Contents

  • AcknowledgmentsChapter 1: IntroductionChapter 2: OSI Model and Then SomeChapter 3: An Introduction to CryptographyChapter 4: SSH FeaturesChapter 5: SSH ShortcomingsChapter 6: SSH Client BasicsChapter 7: The SSH Server BasicsChapter 8: SSH on WindowsChapter 9: Linux SSHChapter 10: Mac SSHChapter 11: SSH Command Line and Advanced Client UseChapter 12: SSH Server Advanced UseChapter 13: SSH Port ForwardingIndex

Advertisement

advert image