To get the free app, enter your e-mail address or mobile phone number.
The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, aka SSH, which isn't a true shell at all, provides your otherwise attack-prone utilities with the protection they need. SSH, The Secure Shell: The Definitive Guide explains how to use SSH at all levels. In a blended sequence, the book explains what SSH is all about, how it fits into a larger security scheme, and how to employ it as an everyday user with an SSH client. More technically detailed chapters show how to configure a SSH server--several variants are covered--and how to integrate SSH with non-Unix client platforms.
As befits its detail- and variation-rich subject, this book comprises many specialised sections, each dealing with some specific aspect of use or configuration (setting up access control at the account level, for example, or generating keys for a particular SSH server). The writing is both informative and fun to read; the authors switch back and forth between text and entry-and-response listings from SSH machines. They often run through a half-dozen or more variants on the same command in a few pages, providing the reader with lots of practical information. The discussion of how SSH fits into a Kerberos Public Key Infrastructure (PKI) is great, as is the advice on defeating particular kinds of attacks. --David Wall
If you are looking to secure your network, or just want to find out more about secure transports, then this is the book to buy. -- Peter Scott, FirstMonday, April 2002See all Product Description
I recently finished reading SSH, The Secure Shell, The Definitive
Guide, by Barrett and Silverman over at O'Reilly. Read more
Although not entirely difficult to follow, this book was useful after a little ssh hands-on.Published on Feb. 3 2003 by SeaMomma
- A complex and hard to master protocol (protocols).
- An invaluable defensive weapon against several types of attacks. Read more
The authors go into quite a lot of detail regarding how SSH works. I found this to be a very valuable reference for SSH. Read morePublished on Jan. 22 2002 by Jamin W. Collins
If you are a UNIX/Linux admin or user, and want the best documentation on SSH then this is the book. Read morePublished on Jan. 14 2002 by Kip Perkins
SSH has quickly become the tool of choice for remotely administering a Unix (or for that matter) Linux computer, replacing telnet, rsh and ftp. Read morePublished on Dec 17 2001 by A Williams
This is a decent book. I suggest it for anyone trying to learn more about the protocol and the program. It differentiates different versions such as OpenSSH, SSH1, and 2. Read morePublished on Oct. 30 2001 by DHL