Cover image for Implementing SSH : Strategies for Optimizing the Secure Shell.
Implementing SSH : Strategies for Optimizing the Secure Shell.
Title:
Implementing SSH : Strategies for Optimizing the Secure Shell.
Author:
Dwivedi, Himanshu.
ISBN:
9780764557255
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (403 pages)
Contents:
Implementing SSH: Strategies for Optimizing the Secure Shell -- Dedication -- Contents -- Acknowledgments -- About the Author -- Author Accomplishments -- Introduction -- What Secure Shell Is -- Implementing and Optimizing SSH -- Why More Secure Shell? -- Best Practice Benefits for Security -- Defenses -- How This Book Is Organized -- Who Should Read This Book -- Platforms -- About the Web Site -- Product Notes -- Part One: SSH Basics -- Chapter 1: Overview of SSH -- Differences between SSH1 and SSH2 -- Various Uses of SSH -- Client/Server Architecture for SSH -- SSH's Encryption Architecture -- Basic Miscues with SSH -- Types of SSH Clients/Servers -- Basic Setup of SSH -- Optimal Uses of SSH -- Summary -- Chapter 2: SSH Servers -- OpenSSH -- SSH Communications' SSH server -- VanDyke Software's VShell SSH Server -- Comparison of OpenSSH, SSH Server, and VShell -- Summary -- Chapter 3: Secure Shell Clients -- Command-Line SSH Clients -- GUI SSH Clients -- PuTTY -- WinSCP -- MindTerm -- MacSSH -- Summary -- Chapter 4: Authentication -- General Options -- Passwords -- Host-Based Authentication -- Server Authentication -- Public Keys -- Summary -- Chapter 5: SSH Management -- Network Devices -- Secure Management -- SOCKS Management -- Summary -- Part Two: Remote Access Solutions -- Chapter 6: SSH Port Forwarding -- Networking Basics of Port Forwarding for Clients -- Networking Basics of Port Forwarding for Servers -- SSH Port Forwarding -- Local Port Forwarding for SSH Clients -- Remote Port Forwarding for SSH Clients -- Port Forwarding for SSH Servers -- Advantages to SSH Port Forwarding -- Summary -- Chapter 7: Secure Remote Access -- Secure E-mail with SSH -- Secure File Transfer ( SMB and NFS) with SSH -- Secure Management with SSH -- Secure VPN with SSH ( PPP over SSH) -- Summary -- Part Three: Protocol Replacement -- Chapter 8: SSH Versatility.

Terminal Access -- File Transfer with Secure File Transfer Protocol ( SFTP) -- Secure Chat -- Secure Backups -- Summary -- Chapter 9: Proxy Technologies in a Secure Web Environment -- SSH and SOCKS -- Dynamic Port Forwarding and SOCKS -- Secure Web Browsing with SSH -- Securing Wireless Networks with SSH -- Summary -- Chapter 10: SSH Case Studies -- Case Study # 1: Secure Remote Access -- Case Study # 2: Secure Wireless Connectivity -- Case Study # 3: Secure File Servers -- Summary -- Epilogue -- Index -- 217.
Abstract:
A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solution.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: