Book description
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
- Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright
- Lead Author and Technical Editor
- Contributing Authors
- Acknowledgments
- Chapter 1. IntroductionSolutions in this chapter:
- Chapter 2. OSI Model and Then SomeSolutions in this chapter:
-
Chapter 3. An Introduction To CryptographySolutions in this chapter:
- What is Cryptography?
- Cryptography and Information Security
- Cryptographic Protocols and Applications
- Cryptographic Systems
- Introducing Cryptographic Algorithms and Ciphers
- Cryptographic Key Management
- Cryptographic Functions
- Digital Signatures
- Attacks on Cryptosystems
- Cryptography and SSH
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4. SSH FeaturesSolutions in this chapter:
- Chapter 5. SSH ShortcomingsSolutions in this chapter:
- Chapter 6. SSH Client BasicsSolutions in this chapter:
- Chapter 7. The SSH Server BasicsSolutions in this chapter:
- Chapter 8. SSH on WindowsSolutions in this chapter:
- Chapter 9. Linux SSHSolutions in this chapter:
- Chapter 10. Mac SSHSolutions in this chapter:
- Chapter 11. SSH Command Line and Advanced Client UseSolutions in this chapter:
- Chapter 12. SSH Server Advanced UseSolutions in this chapter:
- Chapter 13. SSH Port ForwardingSolutions in this chapter:
- Index
Product information
- Title: Next Generation SSH2 Implementation
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080570006
You might also like
article
Use Github Copilot for Prompt Engineering
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …
book
Foundational Elements of an IoT Solution
If you want to make the most of the IoT for your business, but don’t quite …
book
Continuous Integration mit Hudson – Jenkins
Continuous Integration wird so wichtig wie Unit-Testing, und Hudson ist das beste Open-Source-Tool dafür.+ Autor ist …