AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

SSH, The Secure Shell: The Definitive Guide

Please fill out form in order to compare prices
Title: SSH, The Secure Shell: The Definitive Guide
by Daniel J. Barrett, Richard Silverman
ISBN: 0-596-00011-1
Publisher: O'Reilly & Associates
Pub. Date: 15 February, 2001
Format: Paperback
Volumes: 1
List Price(USD): $39.95
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.22 (23 reviews)

Customer Reviews

Rating: 5
Summary: The best SSH publication yet.
Comment: SSH:

- A complex and hard to master protocol (protocols).
- An invaluable defensive weapon against several types of attacks.
- In short time, SSH will be the 'de facto' privacy standard for remote connections and transference.

The Approach:

Three extraordinary introduction chapters, clearly and well written, lead you step by step into SSH internals. Several clever graphics, and a lot of basic definitions makes these chapters absolutely self contained.
The rest of the chapters are carefully dedicated to issues related to implementation and use of SSH, and to ports to several Operating Systems.

The Book:

540+ Pages well structured into 17 chapters and two appendixes.
Clever conventions, and a very useful 'Which Chapters Are for You' guide.
Plenty of 'real world' examples and 63 pages of special case studies.

The Covered Protocols:

- SSH1.
- F-Secure SSH1.
- OpenSSH.
- SSH2.
- F-Secure SSH2.

The Intended Audience:

Quoting the authors: " We've written this book for system administrators and technically minded users. Some chapters are suitable for a wide audience, while others are thoroughly technical and intended for computer and networking professionals."

The Bottom Line:

Being a computer security professor, I constantly assign to my students complex laboratory works related to SSH. Well, with the only help of this book, they usually succeed in their tasks and even improve the original projects.
It is a worthy book and really deserves to be purchased.

Rating: 3
Summary: Good book untill you really need to put SSH to use
Comment: I bought this book several months ago because I was considering implementing SSH into a systm. Prior to reading the book, I had little understanding of SSH other than that it provides secure versions of popular tools such as FTP.
I initially read most of it during a cross-country flight. It was really good, and I came away with a good theoretical understanding of SSH. Now here I am several months later trying to actually implement it, and I'm not so pleased with the book. Infomation is scattered throughout the book. If you don't believe me, take a look at the index, it is online here at the Amazon site. As you are reading a topic, the texts suggests you bounce to another page, then another, and another. It's very confusing. Also, probably not so much of the book's fault, but there are a lot of flavors of SSH (both protocols (2) and implementations (many)). I find it very difficult to understand which material in the general text applies to the version I am using. There is a good index that does break down some commands and associated options / arguments by SSH implementation.
One good thing, though, is that I emailed the authors a question, and one of them actually responded.

Rating: 4
Summary: A great book overall, a few flaws
Comment: SSH, the Secure Shell: The Defintiive Guide is another great book from O'Reilly. As the name would suggest, however, it's not so much a meant as a tutorial or a howto as it is an in-depth analysis of SSH's workings, though the examples given could probably be used as the former.

The first chapters of the book begin with a lookat what SSH is, a summary of its general uses, and the differences between the various SSH implmentations. It then quickly moves onto a number of practical examples, with explanations of both the 'how' and 'why' behind the examples.

Some of the more interesting examples are those that demonstrate X11 tunnelling, key management, and how SSH can be integrated with other applications (such as PGP, for example).

One of the major faults of the book is in the writing style. The regular switching back and forth between a conversational tone and a serious, technical one was something that I found rather annoying. But other than that, this is more or less a well-rounded and nicely written book on SSH, and I would certainly recommend it to anyone who is interested in this topic.

Similar Books:

Title: Network Security with OpenSSL
by John Viega, Matt Messier, Pravir Chandra
ISBN: 059600270X
Publisher: O'Reilly & Associates
Pub. Date: 15 June, 2002
List Price(USD): $39.95
Title: DNS and BIND, Fourth Edition
by Cricket Liu, Paul Albitz
ISBN: 0596001584
Publisher: O'Reilly & Associates
Pub. Date: 01 April, 2001
List Price(USD): $44.95
Title: LDAP System Administration
by Gerald Carter
ISBN: 1565924916
Publisher: O'Reilly & Associates
Pub. Date: 20 March, 2003
List Price(USD): $39.95
Title: Using Samba, Second Edition
by Jay T's, Robert Eckstein, David Collier-Brown
ISBN: 0596002564
Publisher: O'Reilly & Associates
Pub. Date: February, 2003
List Price(USD): $39.95
Title: sendmail, 3rd Edition
by Bryan Costales, Eric Allman
ISBN: 1565928393
Publisher: O'Reilly & Associates
Pub. Date: December, 2002
List Price(USD): $59.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache