- Paperback: 540 pages
- Publisher: O'Reilly Media; 1 edition (February 15, 2001)
- Language: English
- ISBN-10: 0596000111
- ISBN-13: 978-0596000110
- Product Dimensions: 7 x 1.1 x 9.2 inches
- Shipping Weight: 1.5 pounds (View shipping rates and policies)
- Average Customer Review: 25 customer reviews
- Amazon Best Sellers Rank: #3,565,631 in Books (See Top 100 in Books)
To get the free app, enter your mobile phone number.
SSH, The Secure Shell: The Definitive Guide 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Customers who viewed this item also viewed
The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, a.k.a. SSH (which isn't a true shell at all) provides your otherwise attack-prone utilities with the protection they need. SSH: The Secure Shell: The Definitive Guide explains how to use SSH at all levels. In a blended sequence, the book explains what SSH is all about, how it fits into a larger security scheme, and how to employ it as an everyday user with an SSH client. More technically detailed chapters show how to configure a SSH server--several variants are covered--and how to integrate SSH with non-Unix client platforms.
As befits its detail- and variation-rich subject, this book comprises many specialized sections, each dealing with some specific aspect of use or configuration (setting up access control at the account level, for example, or generating keys for a particular SSH server). The writing is both informative and fun to read; the authors switch back and forth between text and entry-and-response listings from SSH machines. They often run through a half-dozen or more variants on the same command in a few pages, providing the reader with lots of practical information. The discussion of how SSH fits into a Kerberos Public Key Infrastructure (PKI) is great, as is the advice on defeating particular kinds of attacks. --David Wall
- The Secure Shell (SSH) for installers, administrators, and everyday users
- SSH design and operation
- Server setup
- SSH agents
- Client configuration
- Public Key Infrastructure (PKI) integration
- OpenSSH for Unix
- SSH1 and SecureCRT for Microsoft Windows
- NiftyTelnet SSH for Mac OS
'This book is a must for any person who uses the Internet for communicating with remote servers.' news@UK, October 2001, reviewed by Virantha Mendis '... probably one of the most useful books I have come across in the last twelve months. It contains all the detail I required to set up a secure infrastructure for auditing the server installations we have in the organization. We, as a team, are now working on using SCP rather than FTP to manage Oracle archive log shipping between sites for standby databases, and when I dial into the office from home, SSH gives me a more secure route into the servers than telnet ever did. The most telling fact is that I had a terrible job getting the book back from my colleagues to review. If you are looking to secure your network, or just want to find out more about secure transports, then this is the book to buy. Now if I can only find out who's got it now...? - Peter Scott, http://firstmonday.org/issue7_4/reviews
Top customer reviews
I find the writing style to be very easy to read, and entertaining, but more importantly, the authors make every effort to clarify important SSH concepts, and then relate them to later chapters. The fact that the authors take the time to review and relate the information covered in previous chapters is something most authors miss, yet is very effective in making sure the reader will remember the information in the long term.
The format too is excellent in subtle ways. When the authors refer to a concept in another chapter, they mark the chapter and section number in brackets nearby. This makes looking up information much easier, and is another thing computer writers tend to overlook. I sincerely hope these guys write more books for O'Reilly.
In terms of covering SSH, this book can't be beat. Admittedly, the focus is very much on SSH for Unix, but the authors admit that from the start and point out chapters that are useful for PC/Mac users. This book covers every facet of SSH1,SSH2, and OpenSSH, and covers all three effectively.
To summarize, anyone interested in SSH is strongly encouraged to read this book, particularly if you use Unix/Linux. I feel that reading this book was time very well spent, and feel much more confident in regards to using SSH.
I truly enjoyed the books explanation of how a secure channel is established before login occurs. This explains the "magic" of the authentication process that is so integral to SSH. Its explanation of publickey authentication is also excellent. It helps you to really understand what SSH is for and how it can be used.
Examples are a bit too cluttered at times and are lost on the reader. I was also expecting a better explanation on how to "implement and administer" SSH at my site. For example, creating SSH packages and keeping known_host files updated. I have found the most useful information on these topics from various internet articles.
If you're truly interested in the inner-workings of SSH, I would strongly recommend this book.
- A complex and hard to master protocol (protocols).
- An invaluable defensive weapon against several types of attacks.
- In short time, SSH will be the 'de facto' privacy standard for remote connections and transference.
Three extraordinary introduction chapters, clearly and well written, lead you step by step into SSH internals. Several clever graphics, and a lot of basic definitions makes these chapters absolutely self contained.
The rest of the chapters are carefully dedicated to issues related to implementation and use of SSH, and to ports to several Operating Systems.
540+ Pages well structured into 17 chapters and two appendixes.
Clever conventions, and a very useful 'Which Chapters Are for You' guide.
Plenty of 'real world' examples and 63 pages of special case studies.
The Covered Protocols:
- F-Secure SSH1.
- F-Secure SSH2.
The Intended Audience:
Quoting the authors: " We've written this book for system administrators and technically minded users. Some chapters are suitable for a wide audience, while others are thoroughly technical and intended for computer and networking professionals."
The Bottom Line:
Being a computer security professor, I constantly assign to my students complex laboratory works related to SSH. Well, with the only help of this book, they usually succeed in their tasks and even improve the original projects.
It is a worthy book and really deserves to be purchased.
Most recent customer reviews
Guide, by Barrett and Silverman over at O'Reilly.Read more