Listing 1 - 3 of 3 |
Sort by
|
Choose an application
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SS
Computer. Automation --- Computer security. --- Data encryption (Computer science) --- Computer networks --- Security measures. --- UNIX Shells. --- Information Technology --- General and Others
Choose an application
The bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of shell internals, shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming Unix lore, you can write professional bash 4.0 programs through standard programming techniques. Complete bash coverage Teaches bash as a programming language Helps you master bash 4.0 features.
Information Technology --- Computer Science (Hardware & Networks) --- General and Others --- Operating systems (Computers) --- Computer operating systems --- Computers --- Disk operating systems --- Operating systems --- UNIX Shells. --- Linux. --- Slackware Linux --- SUSE Linux --- UNIX Shells (Computer programs) --- Shell (Computer file) --- Shells (Computer file) --- UNIX Shell --- Computer science. --- Computer Science. --- Computer Science, general. --- Informatics --- Science --- Systems software --- Open source software. --- Computer programming. --- Software engineering. --- Open Source. --- Software Engineering/Programming and Operating Systems. --- UNIX (Computer file) --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Programming --- UNIX (Computer operating system) --- UNIX shells.
Choose an application
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SS
Computer security. --- Data encryption (Computer science) --- Computer networks --- Security measures. --- UNIX Shells. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- UNIX Shells (Computer programs) --- Shell (Computer file) --- Shells (Computer file) --- UNIX Shell --- Information Technology --- General and Others
Listing 1 - 3 of 3 |
Sort by
|