SSH, The Secure Shell: The Definitive Guide, 2/e (Paperback) (SSH 安全外殼:權威指南,第二版)
Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
買這商品的人也買了...
-
$1,330$1,260 -
$650$553 -
$590$466 -
$680$578 -
$2,010$1,910 -
$850$723 -
$750$638 -
$490$382 -
$780$663 -
$2,510$2,385 -
$890$703 -
$650$553 -
$650$507 -
$620$527 -
$750$638 -
$880$748 -
$780$663 -
$880$748 -
$2,180$2,071 -
$880$695 -
$650$507 -
$1,200$1,176 -
$1,881$1,782 -
$1,045$990 -
$764HTTP 權威指南 (HTTP: The Definitive Guide)
相關主題
商品描述
Description:
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.
Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.
How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.
Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.
No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
Table of Contents:
Preface
1. Introduction to SSH
1.1 What Is SSH?
1.2 What SSH Is Not
1.3 The SSH Protocol
1.4 Overview of SSH Features
1.5 History of SSH
1.6 Related Technologies
1.7 Summary
2. Basic Client Use
2.1 A Running Example
2.2 Remote Terminal Sessions with ssh
2.3 Adding Complexity to the Example
2.4 Authentication by Cryptographic Key
2.5 The SSH Agent
2.6 Connecting Without a Password or Passphrase
2.7 Miscellaneous Clients
2.8 Summary
3. Inside SSH
3.1 Overview of Features
3.2 A Cryptography Primer
3.3 The Architecture of an SSH System
3.4 Inside SSH-2
3.5 Inside SSH-1
3.6 Implementation Issues
3.7 SSH and File Transfers (scp and sftp)
3.8 Algorithms Used by SSH
3.9 Threats SSH Can Counter
3.10 Threats SSH Doesn't Prevent
3.11 Threats Caused by SSH
3.12 Summary
4. Installation and Compile-Time Configuration
4.1. Overview
4.2 Installing OpenSSH
4.3 Installing Tectia
4.4 Software Inventory
4.5 Replacing r-Commands with SSH
4.6 Summary
5. Serverwide Configuration
5.1 Running the Server
5.2 Server Configuration: An Overview
5.3 Getting Ready: Initial Setup
5.4 Authentication: Verifying Identities
5.5 Access Control: Letting People In
5.6 User Logins and Accounts
5.7 Forwarding
5.8 Subsystems
5.9 Logging and Debugging
5.10 Compatibility Between SSH-1 and SSH-2 Servers
5.11 Summary
6. Key Management and Agents
6.1 What Is an Identity?
6.2 Creating an Identity
6.3 SSH Agents
6.4 Multiple Identities
6.5 PGP Authentication in Tectia
6.6 Tectia External Keys
6.7 Summary
7. Advanced Client Use
7.1 How to Configure Clients
7.2 Precedence
7.3 Introduction to Verbose Mode
7.4 Client Configuration in Depth
7.5 Secure Copy with scp
7.6 Secure, Interactive Copy with sftp
7.7 Summary
8. Per-Account Server Configuration
8.1 Limits of This Technique
8.2 Public-Key-Based Configuration
8.3 Hostbased Access Control
8.4 The User rc File
8.5 Summary
9. Port Forwarding and X Forwarding
9.1 What Is Forwarding?
9.2 Port Forwarding
9.3 Dynamic Port Forwarding
9.4 X Forwarding
9.5 Forwarding Security: TCP-wrappers and libwrap
9.6 Summary
10. A Recommended Setup
10.1 The Basics
10.2 Compile-Time Configuration
10.3 Serverwide Configuration
10.4 Per-Account Configuration
10.5 Key Management
10.6 Client Configuration
10.7 Remote Home Directories (NFS, AFS)
10.8 Summary
11. Case Studies
11.1 Unattended SSH: Batch or cron Jobs
11.2 FTP and SSH
11.3 Pine, IMAP, and SSH
11.4 Connecting Through a Gateway Host
11.5 Scalable Authentication for SSH
11.6 Tectia Extensions to Server Configuration Files
11.7 Tectia Plugins
12. Troubleshooting and FAQ
12.1 Debug Messages: Your First Line of Defense
12.2 Problems and Solutions
12.3 Other SSH Resources
13. Overview of Other Implementations
13.1 Common Features
13.2 Covered Products
13.3 Other SSH Products
14. OpenSSH for Windows
14.1 Installation
14.2 Using the SSH Clients
14.3 Setting Up the SSH Server
14.4 Public-Key Authentication
14.5 Troubleshooting
14.6 Summary
15. OpenSSH for Macintosh
15.1 Using the SSH Clients
15.2 Using the OpenSSH Server
16. Tectia for Windows
16.1 Obtaining and Installing
16.2 Basic Client Use
16.3 Key Management
16.4 Accession Lite
16.5 Advanced Client Use
16.6 Port Forwarding
16.7 Connector
16.8 File Transfers
16.9 Command-Line Programs
16.10 Troubleshooting
16.11 Server
17. SecureCRT and SecureFX for Windows
17.1 Obtaining and Installing
17.2 Basic Client Use
17.3 Key Management
17.4 Advanced Client Use
17.5 Forwarding
17.6 Command-Line Client Programs
17.7 File Transfer
17.8 Troubleshooting
17.9 VShell
17.10 Summary
18. PuTTY for Windows
18.1 Obtaining and Installing
18.2 Basic Client Use
18.3 File Transfer
18.4 Key Management
18.5 Advanced Client Use
18.6 Forwarding
18.7 Summary
A. OpenSSH 4.0 New Features
B. Tectia Manpage for sshregex
C. Tectia Module Names for Debugging
D. SSH-1 Features of OpenSSH and Tectia
E. SSH Quick Reference
Index
商品描述(中文翻譯)
描述:
你對網絡安全很認真嗎?那麼請看看SSH(Secure Shell),它提供基於密鑰的身份驗證和透明加密,用於網絡連接。它可靠、強大,並且相對容易使用,且大多數操作系統都有免費和商業實現。雖然它不能解決所有隱私和安全問題,但SSH能夠非常有效地消除其中幾個。
關於SSH的一切都在我們的第二版《SSH,安全外殼:權威指南》中。這本更新的書籍全面介紹了最新的SSH-2協議,適用於系統管理員和終端用戶,他們有興趣使用這種越來越受歡迎的基於TCP/IP的解決方案。
它是如何工作的?每當數據被發送到網絡時,SSH會自動對其進行加密。當數據到達目標接收者時,SSH會對其進行解密。結果是“透明”的加密-用戶可以正常工作,而不知道他們的通信已經被加密。SSH支持計算機之間的安全文件傳輸,安全的遠程登錄,以及一種獨特的“隧道”功能,可以為本來不安全的網絡應用程序添加加密。使用SSH,用戶可以自由瀏覽互聯網,系統管理員可以保護他們的網絡或進行遠程管理。
《SSH,安全外殼:權威指南》針對廣泛的技術讀者,涵蓋了不同操作系統和計算環境下的幾種SSH實現。無論你是在家中運行Linux機器的個人,還是擁有數千個用戶的企業網絡管理員,或者只是想要一種安全的telnet或文件傳輸方式的PC/Mac用戶,我們不可或缺的指南都能滿足你的需求。它從簡單的安裝和使用SSH開始,並逐步深入研究大型敏感計算機網絡的案例研究。
無論你在哪裡或如何傳輸信息,《SSH,安全外殼:權威指南》都將向你展示如何安全地進行操作。
目錄:
前言
1. SSH簡介
1.1 什麼是SSH?
1.2 SSH不是什麼
1.3 SSH協議
1.4 SSH功能概述
1.5 SSH的歷史
1.6 相關技術
1.7 摘要
2. 基本客戶端使用
2.1 一個運行示例
2.2 使用ssh進行遠程終端會話
2.3 為示例添加複雜性
2.4 通過密鑰進行身份驗證
2.5 SSH代理
2.6
無需密碼或密語的連接
2.7
其他客戶端
2.8 摘要
3. SSH內部結構
3.1 功能概述
3.2 密碼學基礎知識
3.3 SSH系統的架構
3.4 SSH-2內部結構
3.5 SSH-1內部結構
```