 |
|
 Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  SSH, The Secure Shell: The Definitive GuideSecure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,... |  |  SSH, the Secure Shell: The Definitive GuideAre you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... |
|
|
 Mastering Red Hat Enterprise Linux 3Your Complete Guide to the World’s Leading Linux Enterprise Distribution
Red Hat Enterprise Linux 3 is emerging as the corporate Linux standard. One of the first books to focus on this robust product, Mastering Red Hat Enterprise Linux 3 gives you the practical information you need to install, configure, and... |  |  Special Edition Using LinuxLinux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera... |  |  Linux Firewalls (3rd Edition)An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most... |
|
 Pro OpenSSHSSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.
Some of the... |  |  Linux Smart Homes For Dummies (Computer/Tech)Make your home safer and more efficient with Linux
Linux home automation has never been simpler or more fun!
A smart home's a happy home! Teach yours lots of new tricks with Linux. Not only can you arrange automation for lights, appliances, and watering the lawn, you can also... |  |  HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... |
|
Result Page: 6 5 4 3 2 1 |