Implementing SSH : strategies for optimizing the secure shell
| Main Author: | |
|---|---|
| Format: | Book |
| Published: |
Indiana:
Wiley Publishing,
2004.
|
| Subjects: |
| LEADER | 00539pamaa2200169 4500 | ||
|---|---|---|---|
| 001 | 0000036491 | ||
| 005 | 20100201090000.0 | ||
| 020 | 0 | 0 | |a 0471458805 (pbk) |
| 082 | |a 005.8 DWI | ||
| 090 | 0 | 0 | |a QA76.76.O63 |b DWI 2004 |
| 100 | 1 | 0 | |a DWIVEDI |
| 245 | 1 | 0 | |a Implementing SSH : |b strategies for optimizing the secure shell |c Himanshu Dwivedi. |
| 260 | 0 | 0 | |a Indiana: |b Wiley Publishing, |c 2004. |
| 300 | |a xxvi, 376p.: |b ill.; |c 24cm. | ||
| 650 | 0 | 0 | |a Computer network -- |x Security Measures |
| 650 | 0 | 0 | |a Data encryption (Computer science) |
| 650 | 0 | 0 | |a UNIX shells |


