TY - BOOK AU - Dwivedi,Himanshu ED - ebrary, Inc. TI - Implementing SSH: strategies for optimizing the Secure Shell AV - QA76.76.O63 D895 2004eb U1 - 005.8 22 PY - 2004/// CY - Indianapolis, Ind., [Chichester] PB - Wiley KW - UNIX Shells KW - Computer networks KW - Security measures KW - Data encryption (Computer science) KW - Electronic books KW - local N1 - Includes index; pt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies; Electronic reproduction; Palo Alto, Calif.; ebrary; 2009; Available via World Wide Web; Access may be limited to ebrary affiliated libraries UR - http://ezproxy.taylors.edu.my/login?url=http://site.ebrary.com/lib/taylorscollege/Doc?id=10114250 ER -