微信扫一扫联系客服

微信扫描二维码

进入报告厅H5

关注报告厅公众号

60

电子书-实施SSH优化安全外壳的策略(英)

# 计算机 # 操作系统 # 网络安全 大小:6.34M | 页数:405 | 上架时间:2022-04-05 | 语言:英文

电子书-实施SSH优化安全外壳的策略(英).pdf

电子书-实施SSH优化安全外壳的策略(英).pdf

试看10页

类型: 电子书

上传者: 二一

出版日期: 2022-04-05

摘要:

A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your networkPrevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on UnixR, WindowsR, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients.With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solutionAuthor Bio: HIMANSHU DWIVEDI is Managing Security Architect for @stake, the leading provider of digital security services. He is also a security training leader for the @stake Academy, and has published two books on storage security. His professional experience includes application programming, security consultancy, and secure product design with an emphasis on secure network architecture and server risk assessment.

安装、实施、优化和支持SSH的战术指南,以确保你的网络安全防止不必要的黑客攻击! 这本详细的指南将告诉你如何通过部署SSH来加强你公司系统的防御,保持关键数据的安全,并增加你的网络的功能。安全专家Himanshu Dwivedi告诉你如何在几乎所有的操作系统、台式机和服务器上实施SSH,使你的系统安全、可靠、稳定。了解SSH如何满足安全方面的所有核心项目,包括认证、授权、加密、完整性和审计。同时,发现在UnixR、WindowsR和网络架构环境中优化协议的安全和功能的方法。此外,了解主要的SSH服务器和客户端的异同。在大量架构实例和案例研究的帮助下,你将获得必要的技能。* 探索许多远程访问解决方案,包括端口转发的理论、设置和配置 *利用安全电子邮件、代理和动态端口转发等功能 *在传统上由Telnet管理的网络设备上使用SSH *在服务器和客户端方面利用SSH作为VPN解决方案 *取代不安全的协议,如Rsh、Rlogin和FTP *使用SSH来保证Web浏览的安全和作为安全无线(802.11)解决方案作者简介。HIMANSHU DWIVEDI是@stake的管理安全架构师,该公司是数字安全服务的领先供应商。他也是@stake学院的安全培训负责人,并出版了两本关于存储安全的书。他的专业经验包括应用程序编程、安全咨询和安全产品设计,重点是安全网络架构和服务器风险评估。


展开>> 收起<<

请登录,再发表你的看法

登录/注册

二一

相关文库

更多

浏览量

(59)

下载

(0)

收藏

分享

购买

5积分

0积分

原价5积分

VIP

*

投诉主题:

  • 下载 下架函

*

描述:

*

图片:

上传图片

上传图片

最多上传2张图片

提示

取消 确定

提示

取消 确定

提示

取消 确定

积分充值

选择充值金额:

30积分

6.00元

90积分

18.00元

150+8积分

30.00元

340+20积分

68.00元

640+50积分

128.00元

990+70积分

198.00元

1640+140积分

328.00元

微信支付

余额支付

积分充值

填写信息

姓名*

邮箱*

姓名*

邮箱*

注:填写完信息后,该报告便可下载

选择下载内容

全选

取消全选

已选 1