Next generation SSH2 implementation: securing data in motion
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2009
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox |
Beschreibung: | 1 Online-Ressource (xxi, 312 p.) |
ISBN: | 9781597492836 1597492833 9780080570006 0080570003 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305287 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781597492836 |9 978-1-59749-283-6 | ||
020 | |a 1597492833 |9 1-59749-283-3 | ||
020 | |a 9780080570006 |c electronic bk. |9 978-0-08-057000-6 | ||
020 | |a 0080570003 |c electronic bk. |9 0-08-057000-3 | ||
035 | |a (ZDB-33-EBS)ocn316577448 | ||
035 | |a (OCoLC)316577448 | ||
035 | |a (DE-599)BVBBV042305287 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Liu, Dale |e Verfasser |4 aut | |
245 | 1 | 0 | |a Next generation SSH2 implementation |b securing data in motion |c Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2009 | |
300 | |a 1 Online-Ressource (xxi, 312 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox | ||
630 | 0 | 4 | |a UNIX Shells |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a UNIX Shells |2 blmlsh | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Data encryption (Computer science) |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks |x Security measures | |
653 | |a Electronic books | ||
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492836 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742279 |
Datensatz im Suchindex
_version_ | 1804152888234082304 |
---|---|
any_adam_object | |
author | Liu, Dale |
author_facet | Liu, Dale |
author_role | aut |
author_sort | Liu, Dale |
author_variant | d l dl |
building | Verbundindex |
bvnumber | BV042305287 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn316577448 (OCoLC)316577448 (DE-599)BVBBV042305287 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03002nmm a2200529zc 4500</leader><controlfield tag="001">BV042305287</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492836</subfield><subfield code="9">978-1-59749-283-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492833</subfield><subfield code="9">1-59749-283-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080570006</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-057000-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080570003</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-057000-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn316577448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316577448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305287</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Dale</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Next generation SSH2 implementation</subfield><subfield code="b">securing data in motion</subfield><subfield code="c">Dale Liu, lead author and technical editor ; Max Caceres ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 312 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">UNIX Shells</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">UNIX Shells</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492836</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742279</subfield></datafield></record></collection> |
id | DE-604.BV042305287 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597492836 1597492833 9780080570006 0080570003 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742279 |
oclc_num | 316577448 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxi, 312 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Liu, Dale Verfasser aut Next generation SSH2 implementation securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] Burlington, MA Syngress Pub. c2009 1 Online-Ressource (xxi, 312 p.) txt rdacontent c rdamedia cr rdacarrier Includes index New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards. This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. * Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox UNIX Shells COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh UNIX Shells blmlsh Computer security local Data encryption (Computer science) local Computer networks / Security measures local Computer security Data encryption (Computer science) Computer networks Security measures Electronic books http://www.sciencedirect.com/science/book/9781597492836 Verlag Volltext |
spellingShingle | Liu, Dale Next generation SSH2 implementation securing data in motion UNIX Shells COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh UNIX Shells blmlsh Computer security local Data encryption (Computer science) local Computer networks / Security measures local Computer security Data encryption (Computer science) Computer networks Security measures |
title | Next generation SSH2 implementation securing data in motion |
title_auth | Next generation SSH2 implementation securing data in motion |
title_exact_search | Next generation SSH2 implementation securing data in motion |
title_full | Next generation SSH2 implementation securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] |
title_fullStr | Next generation SSH2 implementation securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] |
title_full_unstemmed | Next generation SSH2 implementation securing data in motion Dale Liu, lead author and technical editor ; Max Caceres ... [et al.] |
title_short | Next generation SSH2 implementation |
title_sort | next generation ssh2 implementation securing data in motion |
title_sub | securing data in motion |
topic | UNIX Shells COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh UNIX Shells blmlsh Computer security local Data encryption (Computer science) local Computer networks / Security measures local Computer security Data encryption (Computer science) Computer networks Security measures |
topic_facet | UNIX Shells COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Data encryption (Computer science) Computer networks / Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597492836 |
work_keys_str_mv | AT liudale nextgenerationssh2implementationsecuringdatainmotion |