Media praise for SSH, The Secure Shell: The Definitive Guide

"'SSH, the Secure Shell: The Defintiive Guide' is another great book from O'Reilly...a well-rounded and nicely written book on SSH, and I would certainly recommend it to anyone who is interested in this topic."
--Pensacola Linux User's Group, August 7, 2003

"'SSH The Secure Shell' is the antidote to a naive setup. When using SSH frequently in a hostile environment (e.g., over the Internet), it is a 'better have' book...The writing is transparent (doesn't draw attention to itself). Clearly the authors have worked with SSH extensively (the section on FTP is not something you can get from the program documentation). Woven throughout is a gentle critique of where the program design choices could have been better. I expect that this book is going to stay within reach for a week or two while I get my SSH setups running effortlessly and then it will move to the archival bookcase until I need to setup a new computer. That's how I like things to work - set it up right once and then it just works."
--Jeffrey Taylor, ERCB, December 2002

"Recommended reading ... an excellent tool at the disposal of system administrators...'SSH, the Secure Shell: The Definitive Guide' is a resource that system administrators will want to keep close at hand."
--Will Bober, Bay Linux User Group, Saskatoon, Canada

"'SSH, The Secure Shell: The Definitive Guide' will be another 'must have' O'Reilly volume for many system administrators...a valuable resource...Its explanations are clear and thorough...Perhaps most importantly, 'The Secure Shell' is organized so one can easily skip unwanted detail and find just those portions that are relevant. As a result, it can be used in different ways--read through to learn about ssh and what it can be used for, or just consulted as necessary to answer particular questions or solve particular problems."
--Danny Yee,, May 2002

"This book has been difficult to review, not because of any difficulty in reading the book; the authors have made what could be a dry textbook immensely readable. The difficulty I have had reviewing it was that I took it to work to help me with a task I was carrying out, and my fellow Sys Admins fell on it with great interest. It took me some time to get hold of it for long enough to go through it in the detail needed for a common with all of O'Reilly's titles, the authors have gone to pains to explain the subject without being boring. Where it would be clearer to have a diagram to reinforce a point then there is a diagram…If you are looking to secure your network, or just want to find out more about secure transports, then this is the book to buy. Now if I can only find out who's got it now."--Peter Scott, FirstMonday, April 2002

"A good source of comparative information without the baggage of unnecessary technical detail." --Major Kearny, Book News, July 2001

"These days, it's folly not to use SSH. O'Reilly gives us the usual thorough guide to the collection of programs that comprise the SSH protocols in this essential bookshelf stuffer for any sysadmin." --Netsurfer Digest Feb 23, 2001

"In a nutshell, the book SSH, the Secure Shell: The Definitive Guide expands on two basic ideas: Privacy is a basic human right, but on today's computer networks, privacy isn't guaranteed. (and) SSH is a simple idea, but it has many complex parts. But the truth is that the need for privacy and security on today's networks is far too important to be encapsulated in two bullets. This book is so loaded with valuable and important information that anyone using or administering SSH should read it thoroughly. SSH, the Secure Shell: The Definitive Guide is everything you need to know about SSH and lives up to its bold claim of being a definitive guide. For the SSH aficionado on a tight budget, the comprehensive SSH FAQ can be downloaded from various sites on the Web. For everyone else who needs to understand the often-undocumented inner-workings of SSH, this book is required reading." --Ben Rothke,, April 2001

The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, a.k.a. SSH (which isn't a true shell at all) provides your otherwise attack-prone utilities with the protection they need. SSH: The Secure Shell: The Definitive Guide explains how to use SSH at all levels. In a blended sequence, the book explains what SSH is all about, how it fits into a larger security scheme, and how to employ it as an everyday user with an SSH client. More technically detailed chapters show how to configure a SSH server--several variants are covered--and how to integrate SSH with non-Unix client platforms.

As befits its detail- and variation-rich subject, this book comprises many specialized sections, each dealing with some specific aspect of use or configuration (setting up access control at the account level, for example, or generating keys for a particular SSH server). The writing is both informative and fun to read; the authors switch back and forth between text and entry-and-response listings from SSH machines. They often run through a half-dozen or more variants on the same command in a few pages, providing the reader with lots of practical information. The discussion of how SSH fits into a Kerberos Public Key Infrastructure (PKI) is great, as is the advice on defeating particular kinds of attacks. --David Wall, March 2001