Ssh, the Secure Shell
, by Barrett, Daniel J.Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780596008956 | 0596008953
- Cover: Paperback
- Copyright: 6/30/2005
The new edition of this comprehensive guide covers SSH in detail for experienced system administrators and end users, with expanded coverage of the recent SSH-2 protocol. The book demystifies the SSH man pages and includes thorough coverage of basic to advanced use of SSH client tools for Unix, Windows, and Mac OS X. This updated edition also covers SSH Tectia for both Linux and Windows and ways to install, configure, and maintain SSH, and discusses levels of SSH server control, application tunneling, port and agent forwarding, and forced commands. Readers also find detailed case studies of creating complex applications with SSH, and troubleshooting a wide variety of common and not-so-common problems.
Daniel J. Barrett
Daniel J. Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He is the author of O'Reilly's Linux Pocket Guide, and is the coauthor of Linux Security Cookbook, and the first edition of SSH, The Secure Shell: The Definitive Guide. He also writes monthly columns for Compute! and Keyboard Magazine, and articles for the O'Reilly Network.Richard E. Silverman
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He co-authored the first edition of SSH, The Secure Shell: The Definitive Guide.Robert G. Byrnes
Robert G. Byrnes, Ph.D., has been hacking on Unix systems for twenty years, and has been involved with security issues since the original Internet worm was launched from Cornell University, while he was a graduate student and system administrator. Currently, he's a software engineer at Curl Corporation, and has worked in the fields of networking, telecommunications, distributed computing, financial technology, and condensed matter physics.
Preface | xi | ||||
|
1 | (15) | |||
|
1 | (2) | |||
|
3 | (1) | |||
|
3 | (2) | |||
|
5 | (4) | |||
|
9 | (1) | |||
|
10 | (5) | |||
|
15 | (1) | |||
|
16 | (20) | |||
|
16 | (1) | |||
|
16 | (2) | |||
|
18 | (3) | |||
|
21 | (7) | |||
|
28 | (4) | |||
|
32 | (1) | |||
|
33 | (1) | |||
|
34 | (2) | |||
|
36 | (63) | |||
|
36 | (3) | |||
|
39 | (4) | |||
|
43 | (2) | |||
|
45 | (23) | |||
|
68 | (1) | |||
|
69 | (12) | |||
|
81 | (3) | |||
|
84 | (7) | |||
|
91 | (2) | |||
|
93 | (4) | |||
|
97 | (1) | |||
|
98 | (1) | |||
|
99 | (29) | |||
|
99 | (7) | |||
|
106 | (5) | |||
|
111 | (13) | |||
|
124 | (1) | |||
|
125 | (2) | |||
|
127 | (1) | |||
|
128 | (99) | |||
|
129 | (3) | |||
|
132 | (9) | |||
|
141 | (30) | |||
|
171 | (13) | |||
|
184 | (14) | |||
|
198 | (3) | |||
|
201 | (5) | |||
|
206 | (3) | |||
|
209 | (14) | |||
|
223 | (3) | |||
|
226 | (1) | |||
|
227 | (39) | |||
|
227 | (6) | |||
|
233 | (9) | |||
|
242 | (18) | |||
|
260 | (2) | |||
|
262 | (2) | |||
|
264 | (1) | |||
|
265 | (1) | |||
|
266 | (60) | |||
|
266 | (10) | |||
|
276 | (1) | |||
|
277 | (1) | |||
|
278 | (35) | |||
|
313 | (10) | |||
|
323 | (2) | |||
|
325 | (1) | |||
|
326 | (23) | |||
|
326 | (2) | |||
|
328 | (18) | |||
|
346 | (2) | |||
|
348 | (1) | |||
|
348 | (1) | |||
|
349 | (47) | |||
|
350 | (1) | |||
|
351 | (22) | |||
|
373 | (4) | |||
|
377 | (12) | |||
|
389 | (6) | |||
|
395 | (1) | |||
10. A Recommended Setup | 396 | (12) | |||
|
396 | (1) | |||
|
397 | (1) | |||
|
397 | (6) | |||
|
403 | (1) | |||
|
404 | (1) | |||
|
404 | (1) | |||
|
404 | (3) | |||
|
407 | (1) | |||
11. Case Studies | 408 | (87) | |||
|
408 | (7) | |||
|
415 | (21) | |||
|
436 | (8) | |||
|
444 | (8) | |||
|
452 | (16) | |||
|
468 | (11) | |||
|
479 | (16) | |||
12. Troubleshooting and FAQ | 495 | (20) | |||
|
495 | (2) | |||
|
497 | (16) | |||
|
513 | (2) | |||
13. Overview of Other Implementations | 515 | (6) | |||
|
515 | (1) | |||
|
516 | (1) | |||
|
516 | (5) | |||
14. OpenSSH for Windows | 521 | (5) | |||
|
521 | (1) | |||
|
522 | (1) | |||
|
522 | (2) | |||
|
524 | (1) | |||
|
525 | (1) | |||
|
525 | (1) | |||
15. OpenSSH for Macintosh | 526 | (5) | |||
|
526 | (1) | |||
|
526 | (5) | |||
16. Tectia for Windows | 531 | (32) | |||
|
532 | (1) | |||
|
533 | (1) | |||
|
534 | (2) | |||
|
536 | (3) | |||
|
539 | (3) | |||
|
542 | (1) | |||
|
543 | (8) | |||
|
551 | (1) | |||
|
552 | (2) | |||
|
554 | (1) | |||
|
555 | (8) | |||
17. SecureCRT and SecureFX for Windows | 563 | (13) | |||
|
563 | (1) | |||
|
564 | (1) | |||
|
564 | (4) | |||
|
568 | (2) | |||
|
570 | (2) | |||
|
572 | (1) | |||
|
572 | (2) | |||
|
574 | (1) | |||
|
574 | (1) | |||
|
575 | (1) | |||
18. PuTTY for Windows | 576 | (15) | |||
|
576 | (1) | |||
|
576 | (2) | |||
|
578 | (2) | |||
|
580 | (3) | |||
|
583 | (4) | |||
|
587 | (2) | |||
|
589 | (2) | |||
A. OpenSSH 4.0 New Features | 591 | (4) | |||
B. Tectia Manpage for sshregex | 595 | (9) | |||
C. Tectia Module Names for Debugging | 604 | (5) | |||
D. SSH-1 Features of OpenSSH and Tectia | 609 | (3) | |||
E. SSH Quick Reference | 612 | (17) | |||
Index | 629 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.