UNIX Secure Shell

UNIX Secure Shell

by Anne H. Carasik, Anne Carasik

Other Format(BOOK & CD)

$39.99

Product Details

ISBN-13: 9780071349338
Publisher: McGraw-Hill Companies, The
Publication date: 08/01/1999
Series: McGraw-Hill Tools Series
Edition description: BOOK & CD
Pages: 339
Product dimensions: 6.03(w) x 9.00(h) x 1.03(d)

Table of Contents

Quick Reference xi
List of Figures
xiii
List of Tables
xv
Foreword xvii
Preface xix
Section I Getting and Installing Secure Shell 1(52)
What Is Secure Shell (SSH)?
3(16)
What is Secure Shell?
4(6)
The "s" Commands Versus the "r" Commands
10(7)
Summary
17(2)
Installing Secure Shell on UNIX
19(34)
Which One Do I Install?
20(1)
Requirements
20(2)
Getting SSH
22(1)
Installation Process
23(25)
Running Both SSH1 and SSH2
48(2)
Testing the Application
50(1)
Summary
51(2)
Section II Secure Shell 1 (SSH1) 53(68)
Secure Shell 1 Server Daemon---sshd
55(34)
SSH 1.5 Protocol
56(2)
The Nuts and Bolts
58(11)
Usage of the Secure Shell Daemon
69(19)
Summary
88(1)
Secure Shell Clients---ssh and scp
89(32)
How It Works
90(1)
The Nuts and Bolts
91(5)
Usage of the Secure Shell Clients
96(23)
Summary
119(2)
Section III Secure Shell 2 (SSH2) 121(68)
Secure Shell 2 Server Daemon---sshd2 and sftp-server2
123(32)
SSH 2.0 Protocol
124(3)
The Nuts and Bolts
127(12)
Usage of the Secure Shell Daemon
139(14)
Secure File Transfer Server---sftp-server
153(1)
Summary
154(1)
Secure Shell 2 Clients---ssh2, scp2, and sftp2
155(34)
How It Works
156(1)
The Nuts and Bolts
157(5)
Usage of the Secure Shell Clients
162(25)
Summary
187(2)
Section IV Advanced Usage of Secure Shell 189(132)
Secure Shell Key Management
191(28)
Host Keys
192(5)
User Keys
197(4)
Key Generation
201(9)
Making Your Keys Publicly Available
210(2)
Authentication Agent
212(5)
Summary
217(2)
Secure Shell and Firewalls
219(20)
Defining Firewalls
220(8)
Firewalls and Secure Shell
228(5)
Beyond Basic Firewall Configuration
233(4)
Summary
237(2)
Other Cool Things You Can Do With Secure Shell
239(24)
Using Secure Shell as a Transport Agent
240(14)
Secure Shell and TCP Wrappers
254(2)
Secure Shell for Remote Backups
256(2)
Secure Shell and Other Authentication Methods
258(3)
Summary
261(2)
Troubleshooting Secure Shell
263(58)
Some Basic Troubleshooting Help
264(1)
Things to Help You Troubleshoot
265(2)
Common Problems
267(7)
What to Do If This Doesn't Work
274(1)
Summary
275(2)
Appendixes
A Cryptography Basics
277(20)
What Is Cryptography?
277(3)
Benefits of Cryptography
280(1)
Cryptanalysis
281(4)
What Cryptography Can't Do
285(1)
Symmetric Key
285(4)
Public Key
289(5)
Digital Signatures
294(2)
Hash Functions
296(1)
B International Cryptography Laws
297(10)
International
298(6)
Case Study: Do Crypto Laws Protect or Hinder?
304(3)
C Glossary of Cryptography Terms
307(6)
D What's on the CD-ROM
313(8)
UNIX
314(2)
Windows
316(1)
Others
317(1)
If You're Not in the United States
317(4)
Index 321

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

UNIX Secure Shell 2 out of 5 based on 0 ratings. 3 reviews.
kg4giy on LibraryThing 5 months ago
A good technical resource for using SSH, even if it is a bit dated.
Guest More than 1 year ago
This book is impossible to follow. All of the confusion between SSH1 and SSH2 make this book very frustrating. The book is not presented in a logical fashion. The index is missing references to important commands and terms. This book makes an already confusing topic almost impossible.
Guest More than 1 year ago
Confusing and inconsistent terminology usage. Apparent contradictions from one page to the next. Irrelevant info bits inserted willy-nilly. I came away knowing less than when I started.