Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
SSH, The Secure Shell: The Definitive Guide

SSH, The Secure Shell: The Definitive Guide

List Price: $39.95
Your Price: $26.37
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: Wonderful source of information!
Review: I would highly recommend this text as a source for anyone wanting to either gain knowledge of the SSH protocol, or to complete your mastery of this often complex subject. The wording is perfectly selected at every stage, making this book incredibly easy to read, and increasing the ability to comprehend even the most unusual features. As a security consultant, knowledge of the finer details of topics such as SSH is critical, and this book delivered.

Note: I have been compensated by O'Reilly for acting as a technical reviewer for this publication.

Rating: 5 stars
Summary: Must-have book for all systems administrators...
Review: If you are a Unix administrator, odds are you are administering your machine(s) remotely. They may be in the next room, or halfway across the globe, but they are still being administered "remotely".

Don't even *THINK* about doing that job without using tools like ssh to do so securely (assuming you keep your passwords secret, etc... ;-).

Of course, if you're going to use ssh, then you're going to want to learn how to use it, and how to administer it. That's why you need this book.

Rating: 5 stars
Summary: THE book for ssh
Review: If you are a UNIX/Linux admin or user, and want the best documentation on SSH then this is the book. I personally don't like reading HOWTOs, FAQs, etc on the Computer screen (trying to save my eyes). Anyway, this book gives a well ordered explaination of ssh giving you the ability to read by topic. For example, if you are interested in the options available to configure the authentication process, it is not simply lumped in the list of sshd_config options, but is ALL located in the same place with a good discussion of the option. It is well indexed to find what you need quickly.

One of the best features of the book is that it covers ssh1,
ssh2, and Openssh. Using the authentication example, the book gives you how ssh1 handles it first, then ssh2, and then Openssh. Which is important since they will sometimes handle things differently.

This is only the second book I have used that covers SSH, and it is without a doubt, the better of the two. If you use SSH for production systems, this book is a must.

Rating: 5 stars
Summary: easy to read even to beginners
Review: If you don't want to be a slave of Kerberos (security system of Win 2000 server) read this book. In France, all educationnal network are using SSH with Linux server as firewall.

Rating: 5 stars
Summary: Yup, another HOME RUN!
Review: If you have anything to do with administration of telnet, rsh, ... then you absolutely MUST get this book! Tons of all the most useful & valueable info. This sure looks like one of O'Reilly's BEST.

Rating: 0 stars
Summary: SSH In Depth
Review: Our book is written for all SSH users, from technically-inclined beginners up to experienced sysadmins. We begin with the basics for Unix (SSH, SSH2, OpenSSH, F-Secure) as well as Windows and the Mac. Then we go far beyond the SSH man pages, providing in-depth coverage of advanced topics, such as:

- Integrating Kerberos and SSH.

- Authentication by PGP key, one-time passwords, PAM, ....

- Running sshd on Windows NT.

- Troubleshooting host-based authentication and its interactions with your naming service (DNS, NIS, /etc/hosts, etc.).

- Unattended operation (e.g. using SSH in cron jobs). Different approaches to the authentication problem, their pros, cons, and security implications.

- FTP port forwarding, not only the control channel but also the data channel. (Yes, it can be done! But it's not pretty!) Plus how to forward FTP through a firewall correctly and get around NAT (network address translation) problems.

- Many undocumented interactions between all those darn configuration keywords and compile-time options. (See AllowUsers and DenyUsers battle it out! Learn why SilentDeny has no effect on password or public key authenticated logins! Find out the effect of combining "PermitRootLogin yes" and "IgnoreRootRhosts yes"!) Plus the complete, correct precedence rules for server and client configuration.

- SSH agent behavior and forwarding, including undocumented interactions. (Ever notice that "ssh -i" fails silently if you run an agent?)

- Specifying your hostname vs. "localhost" in a port forwarding: advantages and disadvantages.

These are just a few examples. We hope you'll enjoy the book!

Rating: 3 stars
Summary: Good book untill you really need to put SSH to use
Review: Overall, I didn't really like most of the book. I found the book much too confusing since it described the commerical and open versions of SSH at the same time -- as well as both protocols 1 and 2. My mind likes something much more orthoganal in structure.

I found the OpenSSH man pages much more useful than the book for the operation of OpenSSH.

The back of the book starts to get interesting. For example, it describes the pros and cons of running ssh in a batch process. I wish the information in the front of the book was as useful.

I was looking for a "best practices guide to SSH deployment" rather than just a verbose manpage.

The section on Kerberos and AFS seemed to short, probably because the authors don't use AFS?

I kind of forget how thourough the PAM/OpenSSH part is.

And, I can't recall many debugging tips.

I guess that I had the feeling that the book was a manpage extension rather than a source of good, solid, hard earned pragmatic advice.

I was happy that my employer has a $100.00 book allowance. This isn't a book I care to keep.

Rating: 2 stars
Summary: The benefit of this SSH books was encrypted.
Review: Overall, I didn't really like most of the book. I found the book much too confusing since it described the commerical and open versions of SSH at the same time -- as well as both protocols 1 and 2. My mind likes something much more orthoganal in structure.

I found the OpenSSH man pages much more useful than the book for the operation of OpenSSH.

The back of the book starts to get interesting. For example, it describes the pros and cons of running ssh in a batch process. I wish the information in the front of the book was as useful.

I was looking for a "best practices guide to SSH deployment" rather than just a verbose manpage.

The section on Kerberos and AFS seemed to short, probably because the authors don't use AFS?

I kind of forget how thourough the PAM/OpenSSH part is.

And, I can't recall many debugging tips.

I guess that I had the feeling that the book was a manpage extension rather than a source of good, solid, hard earned pragmatic advice.

I was happy that my employer has a $100.00 book allowance. This isn't a book I care to keep.

Rating: 5 stars
Summary: The internet is not a friendly place
Review: Security on the internet is a must, but getting started and be overwhelming. SSH is a key piece of the overall security picture and there aren't any books that explain the topic better than this "definitive guide". I was able to understand what I needed to get my job done quickly and competently, plus discovered more ways SSH could be helpful to my security environment. If you want the security of SSH but don't have lots of time the information you need is here in one place.

Rating: 5 stars
Summary: SSH, the Secure Shell : The Definitive Guide
Review: Simply a great book. Highly recommended for anyone interested in SSH. Also great for anyone interested about basic client-server cryptographic services on the net. This book is well written and good reading.


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates