000 | 01825nam a2200373Ia 4500 | ||
---|---|---|---|
001 | vtls003195748 | ||
003 | MY-SjTCS | ||
005 | 20200306170817.0 | ||
006 | m u | ||
007 | cr cn||||||||| | ||
008 | 100712s2004 inua s 001 0 eng d | ||
010 | _z 2004-297174 | ||
020 | _z0471458805 (pbk) | ||
035 | _a(CaPaEBR)ebr10114250 | ||
039 | 9 |
_y201007121700 _zVLOAD |
|
040 |
_aCaPaEBR _cCaPaEBR |
||
050 | 1 | 4 |
_aQA76.76.O63 _bD895 2004eb |
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 |
_aDwivedi, Himanshu. _927955 |
|
245 | 1 | 0 |
_aImplementing SSH _h[electronic resource] : _bstrategies for optimizing the Secure Shell / _cHimanshu Dwivedi. |
246 | 3 | _aImplementing secure shell | |
260 |
_aIndianapolis, Ind. ; _a[Chichester] : _bWiley, _cc2004. |
||
300 |
_axxvi, 376 p. : _bill. |
||
500 | _aIncludes index. | ||
505 | 0 | _apt. 1. SSH Basics. ch. 1. Overview of SSH ; ch. 2. SSH Servers ; ch. 3. Secure Shell clients ; ch. 4. Authentication ; ch. 5. SSH Management -- pt. 2. Remote Access Solutions. ch. 6. SSH port forwarding ; ch. 7. Secure remote access -- pt. 3. Protocol replacement. ch. 8. SSH versatility ; ch. 9. Proxy technologies in a secure Web environment ; ch. 10. SSH case studies. | |
529 | _aTSLHHL | ||
533 |
_aElectronic reproduction. _bPalo Alto, Calif. : _cebrary, _d2009. _nAvailable via World Wide Web. _nAccess may be limited to ebrary affiliated libraries. |
||
630 | 0 | 0 |
_aUNIX Shells. _999304 |
650 | 0 |
_aComputer networks _xSecurity measures. _99098 |
|
650 | 0 |
_aData encryption (Computer science) _9202685 |
|
655 | 7 |
_aElectronic books. _2local _9201578 |
|
710 | 2 |
_aebrary, Inc. _925628 |
|
856 | 4 | 0 |
_uhttp://ezproxy.taylors.edu.my/login?url=http://site.ebrary.com/lib/taylorscollege/Doc?id=10114250 _zAn electronic book accessible through the World Wide Web; click to view |
999 |
_c65391 _d65391 |