Commencez à lire SSH, The Secure Shell: The Definitive Guide sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
SSH, The Secure Shell: The Definitive Guide: The Definitive Guide
 
Agrandissez cette image
 

SSH, The Secure Shell: The Definitive Guide: The Definitive Guide [Format Kindle]

Daniel J. Barrett , Richard E. Silverman , Robert G. Byrnes
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 27,80 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 37,90
Prix Kindle : EUR 19,46 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 18,44 (49%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 19,46  
Broché EUR 38,10  

Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Présentation de l'éditeur

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
5.0 étoiles sur 5 Un référence absolue pour maîtriser SSH 31 juillet 2010
Par Cinephile
Format:Broché|Achat vérifié
Le must absolu pour qui veut (ou doit!) maîtriser SSH. Absolument parfait et exhaustif.....Un vrai ouvrage de référence.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.0 étoiles sur 5  37 commentaires
50 internautes sur 53 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The SSH book 4 avril 2001
Par Ben Rothke - Publié sur Amazon.com
Format:Broché
There is a good reason why people write superficial messages on post cards: post cards afford no confidentiality and there is no expectation of privacy. The Internet can be compared to a post card; it is one large system where data is freely interchanged. While common sense tells us that post cards are open to the public, there is a misperception among non-technical Internet users that Internet data is kept private. However, nothing could be further from the truth; on the Wild West net,
all data is inherently open and unregulated.
There are solutions to this predicament. One solution is called SSH (Secure Shell). SSH provides a way to take that "postcard" and have it securely delivered by a courier.
In a nutshell, the book SSH, the Secure Shell: The Definitive Guide expands on two basic ideas: - Privacy is a basic human right, but on today's computer networks, privacy isn't guaranteed. - SSH is a simple idea, but it has many complex parts.
But the truth is that the need for privacy and security on today's networks is far too important to be encapsulated in two bullets. This book is so loaded with valuable and important information that anyone using or administering SSH should read it thoroughly.
As an introduction, SSH is a protocol that enables secure communications between computer systems that are communicating over insecure channels. SSH is more than simply a point-to-point encryption process such as a VPN. SSH allows users to authenticate themselves to remote hosts. After authentication, users can securely execute commands on a remote machine. SSH fills in for the security deficiencies that are inherent in applications such as telnet, ftp, rlogin, rsh, and rcp. The book also shows how SSH can be used to secure other protocols, such as POP, SMTP, IMAP, and others.
SSH was developed in response to the Unix "r" commands' (rsh, rlogin, rcp) vulnerability to attack. Some of these vulnerabilities include password and protocol sniffing, spoofing, eavesdropping and connection hijacking.
SSH, the Secure Shell: The Definitive Guide is everything you need to know about SSH and lives up to its bold claim of being a definitive guide. After an introduction to SSH -- why it came to be needed and its features and history -- the book goes into the core of the administration and use of SSH. The authors explain that SSH is in reality, not a true shell. The two versions of secure shell are SSH1 and SSH2; the book distinguishes between the two and describes when to use each version.
Chapter 2 details the basic client use of SSH. It shows how remote sessions are managed by the program and the various ways a user can authenticate to an SSH server.
Subsequent chapters cover the aspects of installing and compiling SSH. A myriad of different configuration possibilities are discussed. As the authors maintain, SSH is at its foundation a simple idea, but it has countless complex parts. SSH allows for a highly configurable architecture and provides both strong encryption and public-key authentication, but this comes at the price of complexity. The book allows an SSH administrator to understand the various versions and implementations of SSH (SSH1, SSH2, OpenSSH, F-Secure SSH, in addition to ports for Unix, Windows and Macintosh).
Chapter 9 provides in-depth coverage of a powerful feature of SSH -- port forwarding and X forwarding. Forwarding enables SSH to intercept service requests from another software program on one side of the SSH connection, send it across the encrypted connection, and then deliver it to the intended recipient on the other side. X Forwarding enables a user to securely run remote X Window applications by securing the X protocol traffic.
The authors demonstrate their extensive real-world experience with SSH throughout the book. The book includes many technical tips that could only have been obtained through extensive and widespread use. This attention to detail is especially useful considering the documentation provided with the free SSH implementation is often inaccessible for those without extensive SSH experience. Chapter 11 -- Case Studies, available on-line at Unix Review's book excerpt's -- details examples of real-world use of SSH. Two examples are how to integrate SSH with Pine or IMAP and the use of Kerberos with SSH. Anyone attempting such installations and configurations can attest to the difficulties involved.
For anyone who has had occasion to troubleshoot SSH, Chapter 12 -- Troubleshooting and Frequently Asked Questions -- will be a real boon. Many of the common (and some not so common) issues that have left many SSH systems administrators scratching their heads are addressed in this chapter.
For the SSH aficionado on a tight budget, the comprehensive SSH FAQ can be downloaded from various sites on the Web. For everyone else who needs to understand the often-undocumented inner-workings of SSH, this book is required reading.
8 internautes sur 8 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great for understanding SSH, useful for configuring it. 27 octobre 2001
Par R. EARLS - Publié sur Amazon.com
Format:Broché|Achat vérifié
I find too often that SysAdmins simply slap a pre-configured SSH onto their systems and do not truly understand how it works. Tasked with implementing SSH at my UNIX site, I found this book to be useful both in understanding SSH, and actually configuring it. This book is heavily weighted towards SSH1 and SSH2 and provides a wonderful amount of detail. However, I found it's coverage of OpenSSH to be lacking. I had to search the internet for a good deal of supplementary material to get OpenSSH working the way I wanted it to.

I truly enjoyed the books explanation of how a secure channel is established before login occurs. This explains the "magic" of the authentication process that is so integral to SSH. Its explanation of publickey authentication is also excellent. It helps you to really understand what SSH is for and how it can be used.

Examples are a bit too cluttered at times and are lost on the reader. I was also expecting a better explanation on how to "implement and administer" SSH at my site. For example, creating SSH packages and keeping known_host files updated. I have found the most useful information on these topics from various internet articles.

If you're truly interested in the inner-workings of SSH, I would strongly recommend this book.
17 internautes sur 20 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best SSH publication yet. 17 mars 2002
Par Marco De Vivo - Publié sur Amazon.com
Format:Broché|Achat vérifié
SSH:
- A complex and hard to master protocol (protocols).
- An invaluable defensive weapon against several types of attacks.
- In short time, SSH will be the 'de facto' privacy standard for remote connections and transference.
The Approach:
Three extraordinary introduction chapters, clearly and well written, lead you step by step into SSH internals. Several clever graphics, and a lot of basic definitions makes these chapters absolutely self contained.
The rest of the chapters are carefully dedicated to issues related to implementation and use of SSH, and to ports to several Operating Systems.
The Book:
540+ Pages well structured into 17 chapters and two appendixes.
Clever conventions, and a very useful 'Which Chapters Are for You' guide.
Plenty of 'real world' examples and 63 pages of special case studies.
The Covered Protocols:
- SSH1.
- F-Secure SSH1.
- OpenSSH.
- SSH2.
- F-Secure SSH2.
The Intended Audience:
Quoting the authors: " We've written this book for system administrators and technically minded users. Some chapters are suitable for a wide audience, while others are thoroughly technical and intended for computer and networking professionals."
The Bottom Line:
Being a computer security professor, I constantly assign to my students complex laboratory works related to SSH. Well, with the only help of this book, they usually succeed in their tasks and even improve the original projects.
It is a worthy book and really deserves to be purchased.
6 internautes sur 6 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Truly definitive and essential for Unix or Linux owners 17 décembre 2001
Par A Williams - Publié sur Amazon.com
Format:Broché
SSH has quickly become the tool of choice for remotely administering a Unix (or for that matter) Linux computer, replacing telnet, rsh and ftp. This is for good reason, these tools can easily become security holes and it is much easier to keep one tool well maintinaed and secure than a number.
SSH gives improved security, both at login and of the data transmitted between computers. SSH offers both security and privacy, rare things online today. It allows secure communications between computers. SSH allows users to authenticate themselves to remote hosts. After authentication, users can securely execute commands on a remote machine. SSH fills in for the security deficiencies that are inherent in earlier methods.

SSH was developed in response to the vulnerability to attack in earlier remote login and control methods. Some of these vulnerabilities include password and protocol sniffing, spoofing, eavesdropping and connection hijacking. Simply, it is the protocol of choice for secure communications between two computers across internet connections.
Administering and running SSH can be a pain. As the book points out it is a simple concept with complex parts. It took me a good three or four hours for my first connection to a remote computer and another two to get SSH logins working on my computer. This book was an excellent assist throughout.
It covers the three varieties of SSH (SSH 1, SSH2 and Open SSH), giving the differences and benefits of the versions. The book also shows how SSH can be used to secure other protocols, such as POP, SMTP, IMAP, and others.
It also gives detailed explanations of what SSH secures against and, perhaps more importantly, what it doesn't secure against. It explains the key technology and how you can integrate your SSH connections into a Public Key Infrastructure.
I also found the Troubleshooting and Quick Reference sections extremely useful, worth the price of the book on their own.
It does all this in a straight forward and well written manner, covering all the details without treating you like a dummy. The book is extremely well structured and formatted, introducing topics in a methodical way.
I had no need for the sections on various ports of SSH to Windows or the Macintosh prior to OS X, but they read well and seem to cover the topic as well as the other sections. So far I've used SSH assisted this book to connect between my Macintosh running OS X and a Linux host, between a Linux computer and a Linux host and a Linux computer and my OS X Macintosh running as host. While their were minor problems with each of these they were quickly sorted out using the information and troubleshooting sections of this book.
In conclusion, SSH is not a simple topic and this book covers it superbly. I would recommmend it to anyone using or administering SSH. It's one flaw is that it can be a little heavy and hard to understand, though not overly so. I have therefore given it only four stars.
12 internautes sur 14 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Good book untill you really need to put SSH to use 3 janvier 2003
Par Un client - Publié sur Amazon.com
Format:Broché
I bought this book several months ago because I was considering implementing SSH into a systm. Prior to reading the book, I had little understanding of SSH other than that it provides secure versions of popular tools such as FTP.
I initially read most of it during a cross-country flight. It was really good, and I came away with a good theoretical understanding of SSH. Now here I am several months later trying to actually implement it, and I'm not so pleased with the book. Infomation is scattered throughout the book. If you don't believe me, take a look at the index, it is online here at the Amazon site. As you are reading a topic, the texts suggests you bounce to another page, then another, and another. It's very confusing. Also, probably not so much of the book's fault, but there are a lot of flavors of SSH (both protocols (2) and implementations (many)). I find it very difficult to understand which material in the general text applies to the version I am using. There is a good index that does break down some commands and associated options / arguments by SSH implementation.
One good thing, though, is that I emailed the authors a question, and one of them actually responded.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique