Next Generation SSH2 Implementation: Securing Data in Motion
暫譯: 下一代 SSH2 實作:保護數據傳輸安全
Max Caceres, Aaron E. Earle, Devin Ganger, Wipul Jayawickrama, Jan Kanclirz Jr., Dane Liu, Tim Robichaux, Eric S. Seagren, Brad Smith, Christopher Stokes
- 出版商: Syngress Media
- 出版日期: 2008-07-01
- 定價: $1,650
- 售價: 6.0 折 $990
- 語言: 英文
- 頁數: 336
- 裝訂: Paperback
- ISBN: 1597492833
- ISBN-13: 9781597492836
-
相關分類:
資訊安全
立即出貨
買這商品的人也買了...
-
Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library (Paperback)$2,110$2,004 -
Hacking VoIP: Protocols, Attacks, and Countermeasures$1,520$1,444 -
編譯系統設計 (Compilers: Principles, Techniques, and Tools, 2/e)$960$864 -
作業系統精論, 9/e (授權經銷版)$700$665 -
CUDA 並行程序設計 : GPU 編程指南 (CUDA Programming: A Developer's Guide to Parallel Computing with GPUs)$894$849 -
$354並行演算法設計與性能優化 -
$534深入淺出 HTTPS : 從原理到實戰 -
C and C++ Under the Hood (Paperback)$1,200$1,176 -
$657精通 Linux 內核智能設備開發核心技術 -
$601用“芯”探核基於龍芯的 Linux 內核探索解析 -
System Design Interview – An Insider's Guide (Paperback)$1,640$1,607 -
$408算法之禪 : 遞推與遞歸 -
徵服 C指針, 2/e$594$564 -
算法競賽入門經典 — 訓練指南 (升級版)$708$672 -
CPU 設計實戰$594$564 -
Demystified Object-Oriented Programming with C++: Implement proven object-oriented design principles to write better code and create robust software$1,690$1,605 -
$504極限黑客攻防:CTF 賽題揭秘 -
$356數據庫程序員面試筆試通關寶典 -
$615算法訓練營:海量圖解 + 競賽刷題 (入門篇) -
$657C++20 編程技巧:98個問題解決方案示例, 2/e (C++20 Recipes: A Problem-Solution Approach, 2/e) -
$453C++ 新經典:模板與泛型編程 -
$407程序員的制勝技 -
Linux 源碼趣讀$948$900 -
CPU 眼裡的 C/C++$534$507 -
C++ 編程之禪:從理論到實踐$1,134$1,077
資訊安全書展|中文簡體2書75折 英文2書85折 詳見活動內容 »
-
VIP 95折
Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness (Paperback)$2,550$2,422 -
VIP 95折
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility$1,900$1,805 -
85折
$1,785Certificate of Cloud Security Knowledge (Ccsk V5) Study Guide: In-Depth Guidance and Practice -
VIP 95折
Data-Driven Cybersecurity: Reducing Risk with Proven Metrics$2,160$2,052 -
VIP 95折
Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision (Paperback)$1,690$1,605 -
85折
$1,573Microsoft Security Copilot: Master strategies for AI-driven cyber defense -
VIP 90折
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection (Paperback)$2,565$2,430 -
VIP 95折
Privileged Access Management: Strategies for Zero Trust in the Enterprise$1,860$1,767 -
VIP 90折
Identity Security for Software Development: Best Practices That Every Developer Must Know (Paperback)$1,995$1,890 -
VIP 95折
Mastering Palo Alto Networks : The complete journey to firewall mastery from setup to advanced security, 3/e (Paperback)$1,850$1,757 -
VIP 95折
電腦安全:原理與實踐(原書第5版)*此書為英文原文書*$774$735 -
CISSP Study Guide 2025-2026: All in One CISSP Exam Prep for the ICS2 Certified Information Systems Security Professional Certification. With Exam Review Material & 774 CISSP Practice Test Questions (Paperback)$1,800$1,764 -
VIP 95折
IAPP CIPP / US Certified Information Privacy Professional Study Guide (Sybex Study Guide)$2,080$1,976 -
85折
$1,530Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies -
VIP 95折
Cryptography (Paperback)$850$807 -
VIP 95折
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption$2,100$1,995 -
VIP 95折
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc (美國原版)$3,300$3,135 -
85折
$3,383A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice -
85折
$1,785Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles (Paperback) -
VIP 95折
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum$1,840$1,748 -
VIP 90折
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp$2,517$2,385 -
85折
$2,678Developing Cybersecurity Programs and Policies in an Ai-Driven World -
VIP 95折
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection (Paperback)$1,990$1,890 -
VIP 95折
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Hardcover) 2/e$2,800$2,660 -
85折
$1,530Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
商品描述
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.
This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
* Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.
This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
* Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.
商品描述(中文翻譯)
新的安全風險、持續演變的法規以及不斷提高的安全標準,創造了對安全內部信息傳輸的新需求,而 SSH 正是滿足這些需求的解決方案。本書深入探討這些新趨勢,提供有關 SSH 在安全環境中整合的最新資訊。它涵蓋了 SSH-2 的最新功能和應用(該版本於 2006 年獲得 IETF 的提議標準地位)。SSH2 比之前的版本更安全,並且在更廣泛的計算平台上擴展了許多用途。推動 SSH2 新採用的另一個特別因素是近期立法的要求(如 PCI/HIPAA/SOX/FISMA)。SSH 2 成為一個更有價值的工具,因為它提供了符合最新標準的通信安全合規性。
本書提供有關 SSH2 的最新資訊,以實用的、動手操作的、教程風格的參考資料,超越了 UNIX 的實作。它專注於 SSH 2 的最新版本,並包含所有新資訊。
* 探索為何 SSH2 提供比 SSH1 更強大的安全性,以及如何將其納入您的網絡管理軟體工具箱中。
