Jump to ratings and reviews
Rate this book

SSH, The Secure Shell: The Definitive Guide

Rate this book
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH, The Secure Shell: The Definitive Guide, Second Edition, covers the Secure Shell in detail for both system administrators and end users. This new edition adds over 100 new features and options from the latest versions of OpenSSH and SSH Tectia (formerly known as SSH2 from ssh.com). It focuses on the SSH-2 protocol, its internals, and its most popular implementations, including thorough coverage of:OpenSSH and SSH Tectia for Unix, Linux, Mac OS X, and Windows: the basics, the internals, and complex applications Configuring SSH servers and clients, both systemwide and per user, with recommended settings to maximize security Key management using agents, agent forwarding, and forced commands Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT) Integrating SSH with Kerberos, OpenPGP, PAM, and other security-related software Scalable authentication techniques for large installations, including X.509 certificates Installing and maintaining SSH systems Troubleshooting a variety of common and not-so-common problemsWhether you're communicating on a small LAN or across the Internet, SSH can ship your data from 'here' to 'there' efficiently and securely. The number of computer intrusions on the Internet continues to rise. Now, more than ever, you need to practice safe computing using SSH. This

680 pages, Paperback

First published February 8, 2001

41 people are currently reading
281 people want to read

About the author

Daniel J. Barrett

9 books14 followers
Daniel J. Barrett, Ph.D., has been teaching and writing about Linux, the internet, and related technologies for more than 30 years. Dan has also been a software engineer, heavy metal singer, system administrator, university lecturer, birthday party magician, and humorist.

Note: If you are looking for "Daniel J. Barrett" the mystery writer, visit https://www.goodreads.com/author/show....

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
32 (19%)
4 stars
72 (44%)
3 stars
44 (27%)
2 stars
11 (6%)
1 star
3 (1%)
Displaying 1 - 3 of 3 reviews
226 reviews14 followers
September 11, 2025
Even though this book was fun to read and contains some interesting ssh trivia. It is starting to show its age in a quite severe way. But if you read around the outdated things, there are quite some good bits in there which are explained quite well.
Profile Image for Rich Tijerina.
73 reviews2 followers
November 7, 2014
One of my favorite security books. Addresses the holes.
A bit out dated, but it is a good foundation to start digesting the complex topics
Profile Image for Alex Murygin.
14 reviews4 followers
January 8, 2011
Not a briliant book, but i have got some good knowledge from this book.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.