SSH, The Secure Shelltxt,chm,pdf,epub,mobi下载 作者:Daniel J. Barrett/Richard E. Silverman/Robert G. Byrnes 出版社: O'Reilly Media 副标题: The Definitive Guide,2nd edition 出版年: 2005-05-10 页数: 645 定价: USD 44.99 装帧: Paperback ISBN: 9780596008956 内容简介 · · · · · ·Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, ... 作者简介 · · · · · ·Daniel J. Barrett Daniel J. Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He is the author of O'Reilly's Linux Pocket Guide, and is the coauthor of Linux Security Cookbook, and the first edition of SSH, The ... 目录 · · · · · ·Chapter 1 Introduction to SSHWhat Is SSH? What SSH Is Not The SSH Protocol Overview of SSH Features History of SSH · · · · · ·() Chapter 1 Introduction to SSH What Is SSH? What SSH Is Not The SSH Protocol Overview of SSH Features History of SSH Related Technologies Summary Chapter 2 Basic Client Use A Running Example Remote Terminal Sessions with ssh Adding Complexity to the Example Authentication by Cryptographic Key The SSH Agent Connecting Without a Password or Passphrase Miscellaneous Clients Summary Chapter 3 Inside SSH Overview of Features A Cryptography Primer The Architecture of an SSH System Inside SSH-2 Inside SSH-1 Implementation Issues SSH and File Transfers (scp and sftp) Algorithms Used by SSH Threats SSH Can Counter Threats SSH Doesn't Prevent Threats Caused by SSH Summary Chapter 4 Installation and Compile-Time Configuration Overview Installing OpenSSH Installing Tectia Software Inventory Replacing r-Commands with SSH Summary Chapter 5 Serverwide Configuration Running the Server Server Configuration: An Overview Getting Ready: Initial Setup Authentication: Verifying Identities Access Control: Letting People In User Logins and Accounts Forwarding Subsystems Logging and Debugging Compatibility Between SSH-1 and SSH-2 Servers Summary Chapter 6 Key Management and Agents What Is an Identity? Creating an Identity SSH Agents Multiple Identities PGP Authentication in Tectia Tectia External Keys Summary Chapter 7 Advanced Client Use How to Configure Clients Precedence Introduction to Verbose Mode Client Configuration in Depth Secure Copy with scp Secure, Interactive Copy with sftp Summary Chapter 8 Per-Account Server Configuration Limits of This Technique Public-Key-Based Configuration Hostbased Access Control The User rc File Summary Chapter 9 Port Forwarding and X Forwarding What Is Forwarding? Port Forwarding Dynamic Port Forwarding X Forwarding Forwarding Security: TCP-Wrappers and libwrap Summary Chapter 10 A Recommended Setup The Basics Compile-Time Configuration Serverwide Configuration Per-Account Configuration Key Management Client Configuration Remote Home Directories (NFS, AFS) Summary Chapter 11 Case Studies Unattended SSH: Batch or cron Jobs FTP and SSH Pine, IMAP, and SSH Connecting Through a Gateway Host Scalable Authentication for SSH Tectia Extensions to Server Configuration Files Tectia Plugins Chapter 12 Troubleshooting and FAQ Debug Messages: Your First Line of Defense Problems and Solutions Other SSH Resources Chapter 13 Overview of Other Implementations Common Features Covered Products Other SSH Products Chapter 14 OpenSSH for Windows Installation Using the SSH Clients Setting Up the SSH Server Public-Key Authentication Troubleshooting Summary Chapter 15 OpenSSH for Macintosh Using the SSH Clients Using the OpenSSH Server Chapter 16 Tectia for Windows Obtaining and Installing Basic Client Use Key Management Accession Lite Advanced Client Use Port Forwarding Connector File Transfers Command-Line Programs Troubleshooting Server Chapter 17 SecureCRT and SecureFX for Windows Obtaining and Installing Basic Client Use Key Management Advanced Client Use Forwarding Command-Line Client Programs File Transfer Troubleshooting VShell Summary Chapter 18 PuTTY for Windows Obtaining and Installing Basic Client Use File Transfer Key Management Advanced Client Use Forwarding Summary Appendix Colophon · · · · · · () |
开始看的很有意思
内容的话,谈到了很多方面
还没看
好书.值得观看.更是值得收藏.