Next Generation SSH2 Implementation Next Generation SSH2 Implementation

Next Generation SSH2 Implementation

Securing Data in Motion

    • ‏46٫99 US$
    • ‏46٫99 US$

وصف الناشر

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.

- Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١١
١٨ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
٣٣٦
الناشر
Syngress
البائع
Elsevier Ltd.
الحجم
٦
‫م.ب.‬
Pro OpenSSH Pro OpenSSH
٢٠٠٦
SSH, The Secure Shell: The Definitive Guide SSH, The Secure Shell: The Definitive Guide
٢٠٠٥
SSH Mastery SSH Mastery
٢٠١٨
Linux Security Cookbook Linux Security Cookbook
٢٠٠٣
How to Cheat at Securing Linux (Enhanced Edition) How to Cheat at Securing Linux (Enhanced Edition)
٢٠١١
Hack Proofing Sun Solaris 8 (Enhanced Edition) Hack Proofing Sun Solaris 8 (Enhanced Edition)
٢٠٠١
Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
٢٠٠٩
Cisco Router and Switch Forensics Cisco Router and Switch Forensics
٢٠٠٩
Firewall Policies and VPN Configurations Firewall Policies and VPN Configurations
٢٠٠٦