Academic literature on the topic 'SSH SHELL'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SSH SHELL.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SSH SHELL"
Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (June 2, 2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.
Full textHidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.
Full textCosta, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões, and Pedro R. M. Inácio. "Theoretical and practical assessments over SSH." Research and Practice in Technology Enhanced Learning 18 (January 2, 2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.
Full textRamadhan, Rizky, Jonny Latuny, and Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN." Jurnal ISOMETRI 1, no. 1 (May 31, 2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.
Full textDesmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking." INSANtek 3, no. 1 (May 31, 2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.
Full textDesmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking." Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, no. 1 (March 3, 2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.
Full textZuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Full textDjayali, Abdul Djalil, Rifaldi Nurdin, and Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER." Jurnal Komputer dan Informatika 9, no. 1 (March 10, 2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.
Full textCharke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (October 1, 2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Full textQiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework." International Journal of Emerging Technologies in Learning (iJET) 14, no. 16 (August 29, 2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.
Full textDissertations / Theses on the topic "SSH SHELL"
Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.
Full textEngkvist, Tobias. "Remote Netlab." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.
Full textThe projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.
Find full textHuebner, U., Grunewald, Heide, Huettmann, and Trapp. "Mitteilungen des URZ 2/1998." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.
Full textLin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method." Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.
Full textCaleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.
Full textNassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.
Full textMurphy, Michael W., and Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.
Full textThis thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textKUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.
Full textBooks on the topic "SSH SHELL"
Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.
Find full textByrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Edited by Mike Loukides. 2nd ed. Beijing: O'Reilly Media, 2005.
Find full textLoukides, Mike, ed. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.
Find full textImplementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.
Find full textLiu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.
Find full textOn command: Writing a Unix-like shell for MS-DOS. 2nd ed. Redwood City, CA: M & T Books, 1987.
Find full textNext generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.
Find full textBerṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.
Find full textBar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.
Find full textBet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.
Find full textBook chapters on the topic "SSH SHELL"
Schwenk, Jörg. "Secure Shell (SSH)." In Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.
Full textSchwenk, Jörg. "Secure Shell (SSH)." In Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.
Full textLa Lau, Robert. "Secure Shell (SSH)." In Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.
Full textJordan, Vladimir, and Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS." In Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.
Full textKambourakis, Georgios, Angelos Rouskas, and Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections." In Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.
Full text"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.
Full textDzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari, and Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal." In Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.
Full textPulkkis, Göran, Kaj J. Grahn, and Peik Åström. "Network Security Software." In Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.
Full textPollayi, Hemaraju, Prathyusha Bandaru, and Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations." In Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.
Full textChalaev, Djamalutdin, and Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.
Full textConference papers on the topic "SSH SHELL"
Iyappan, P., K. S. Arvind, N. Geetha, and S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol." In 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.
Full textBergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, and Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.
Full textMegalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram, and Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)." In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.
Full textVinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.
Full textVinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.
Full textMalik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Full textDi Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni, and Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater." In ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.
Full textZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Full textZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Full textA.A., Grishina, Toropova T. N., and Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)." In All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.
Full textReports on the topic "SSH SHELL"
Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4251.
Full textYlonen, T. The Secure Shell (SSH) Authentication Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4252.
Full textYlonen, T. The Secure Shell (SSH) Connection Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4254.
Full textVelvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, April 2020. http://dx.doi.org/10.17487/rfc8758.
Full textLehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4250.
Full textYlonen, T. The Secure Shell (SSH) Transport Layer Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4253.
Full textTatham, S., and D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8160.
Full textGalbraith, J., and P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4335.
Full textBellare, M., T. Kohno, and C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4344.
Full textGalbraith, J., and R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4716.
Full text