SSH, The Secure Shell: The Definitive Guide and over one million other books are available for Amazon Kindle. Learn more
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

SSH, The Secure Shell: The Definitive Guide Paperback – Feb 11 2001


See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback, Feb 11 2001
CDN$ 24.99 CDN$ 1.33

There is a newer edition of this item:


2014 Books Gift Guide
Yes Please is featured in our 2014 Books Gift Guide. More gift ideas

Special Offers and Product Promotions

  • Join Amazon Student in Canada


Customers Who Bought This Item Also Bought



Product Details

  • Paperback: 560 pages
  • Publisher: O'Reilly Media; 1 edition (Feb. 11 2001)
  • Language: French
  • ISBN-10: 0596000111
  • ISBN-13: 978-0596000110
  • Product Dimensions: 17.8 x 2.8 x 23.3 cm
  • Shipping Weight: 680 g
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (24 customer reviews)
  • Amazon Bestsellers Rank: #1,402,741 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From Amazon

The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, aka SSH, which isn't a true shell at all, provides your otherwise attack-prone utilities with the protection they need. SSH, The Secure Shell: The Definitive Guide explains how to use SSH at all levels. In a blended sequence, the book explains what SSH is all about, how it fits into a larger security scheme, and how to employ it as an everyday user with an SSH client. More technically detailed chapters show how to configure a SSH server--several variants are covered--and how to integrate SSH with non-Unix client platforms.

As befits its detail- and variation-rich subject, this book comprises many specialised sections, each dealing with some specific aspect of use or configuration (setting up access control at the account level, for example, or generating keys for a particular SSH server). The writing is both informative and fun to read; the authors switch back and forth between text and entry-and-response listings from SSH machines. They often run through a half-dozen or more variants on the same command in a few pages, providing the reader with lots of practical information. The discussion of how SSH fits into a Kerberos Public Key Infrastructure (PKI) is great, as is the advice on defeating particular kinds of attacks. --David Wall

Topics covered:

  • The Secure Shell (SSH) for installers, administrators, and everyday users
  • SSH design and operation
  • Server setup
  • SSH agents
  • Client configuration
  • Public Key Infrastructure (PKI) integration
  • SSH1
  • SSH2
  • F-Secure
  • OpenSSH for Unix
  • SSH1 and SecureCRT for Microsoft Windows
  • NiftyTelnet SSH for Mac OS

Review

If you are looking to secure your network, or just want to find out more about secure transports, then this is the book to buy. -- Peter Scott, FirstMonday, April 2002

Inside This Book (Learn More)
Browse and search another edition of this book.
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.2 out of 5 stars
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
SSH, the Secure Shell: The Defintiive Guide is another great book from O'Reilly. As the name would suggest, however, it's not so much a meant as a tutorial or a howto as it is an in-depth analysis of SSH's workings, though the examples given could probably be used as the former.
The first chapters of the book begin with a lookat what SSH is, a summary of its general uses, and the differences between the various SSH implmentations. It then quickly moves onto a number of practical examples, with explanations of both the 'how' and 'why' behind the examples.
Some of the more interesting examples are those that demonstrate X11 tunnelling, key management, and how SSH can be integrated with other applications (such as PGP, for example).
One of the major faults of the book is in the writing style. The regular switching back and forth between a conversational tone and a serious, technical one was something that I found rather annoying. But other than that, this is more or less a well-rounded and nicely written book on SSH, and I would certainly recommend it to anyone who is interested in this topic.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
I had some experience with ssh prior to purchasing this book, but picked it up to learn about more advanced topics like key pair generation for unattended ssh tunnels.
The content of the book is ok, but the organization is horrible. The authors mix SSH1, SSH2 and OpenSSH and it is easy to get confused as to which files or commands belong to which. To add to the confusion, OpenSSH now appears to support SSH2 protocol so a lot of the file names don't match up. That makes the book a little out-of-date.
The biggest complaint is that there are no "cookbooks". I wanted to do something well-defined and relatively common. There was a section suited specifically to what I wanted. However to ACTUALLY IMPLEMENT the technique, I had to flip back and forth between 5 different sections, plus infer some information about file contents.
There are few complete configuration file examples. There are snips of files scattered throughout a section - again making for a lot of navigation through the book to assemble sufficient information to get the job done.
The index is marginal, which makes this poorly-suited for a reference manual.
In all, a real disappointment for a O'Reilly book. The editors must have been asleep at the wheel.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
I bought this book several months ago because I was considering implementing SSH into a systm. Prior to reading the book, I had little understanding of SSH other than that it provides secure versions of popular tools such as FTP.
I initially read most of it during a cross-country flight. It was really good, and I came away with a good theoretical understanding of SSH. Now here I am several months later trying to actually implement it, and I'm not so pleased with the book. Infomation is scattered throughout the book. If you don't believe me, take a look at the index, it is online here at the Amazon site. As you are reading a topic, the texts suggests you bounce to another page, then another, and another. It's very confusing. Also, probably not so much of the book's fault, but there are a lot of flavors of SSH (both protocols (2) and implementations (many)). I find it very difficult to understand which material in the general text applies to the version I am using. There is a good index that does break down some commands and associated options / arguments by SSH implementation.
One good thing, though, is that I emailed the authors a question, and one of them actually responded.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
Overall, I didn't really like most of the book. I found the book much too confusing since it described the commerical and open versions of SSH at the same time -- as well as both protocols 1 and 2. My mind likes something much more orthoganal in structure.
I found the OpenSSH man pages much more useful than the book for the operation of OpenSSH.
The back of the book starts to get interesting. For example, it describes the pros and cons of running ssh in a batch process. I wish the information in the front of the book was as useful.
I was looking for a "best practices guide to SSH deployment" rather than just a verbose manpage.
The section on Kerberos and AFS seemed to short, probably because the authors don't use AFS?
I kind of forget how thourough the PAM/OpenSSH part is.
And, I can't recall many debugging tips.
I guess that I had the feeling that the book was a manpage extension rather than a source of good, solid, hard earned pragmatic advice.
I was happy that my employer has a $100.00 book allowance. This isn't a book I care to keep.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By A Customer on March 21 2002
Format: Paperback
I had a lot of problems with the "technical" description of the SSH 1 & 2 protocol suites. It seems to me the authors have a half-baked understanding of cryptography theory and a half-baked understanding of the SSH Internet Drafts, and have then combined them to provide a muddled and misleading overview of the protocols.
I think that with a topic as complex and important and network security, it is important to be accurate, and I do believe that you can be accurate without delving into every single detail. But I continue to find passages all over the place (in particular with respect to host- and user-authentication) which leave me scratching my head and wondering: "is this misleading English, or is it just plain wrong?"
SSH-1 is described in this way. Then, the authors proceed to build upon this shaky foundation by describing (in a very handwaving sort of way) how SSH-2 differs from SSH-1. In the process, they gloss over some very fundamental differences between the two protocol suites.
On the other hand, I think the practical presentation of ssh as power tool is very good, and well worth reading. It is the best practical description of ssh that I have encountered.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most recent customer reviews



Feedback