Literatura académica sobre el tema "SSH SHELL"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "SSH SHELL".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "SSH SHELL"
Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH". Jurnal Teknologi Informasi 4, n.º 1 (2 de junio de 2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.
Texto completoHidayat, Muh Adrian Juniarta y Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies". Infotek : Jurnal Informatika dan Teknologi 6, n.º 2 (20 de julio de 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.
Texto completoCosta, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões y Pedro R. M. Inácio. "Theoretical and practical assessments over SSH". Research and Practice in Technology Enhanced Learning 18 (2 de enero de 2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.
Texto completoRamadhan, Rizky, Jonny Latuny y Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN". Jurnal ISOMETRI 1, n.º 1 (31 de mayo de 2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.
Texto completoDesmira, Desmira y Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking". INSANtek 3, n.º 1 (31 de mayo de 2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.
Texto completoDesmira, Desmira y Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking". Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, n.º 1 (3 de marzo de 2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.
Texto completoZuzcák, Matej y Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks". Computer Science and Information Systems, n.º 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Texto completoDjayali, Abdul Djalil, Rifaldi Nurdin y Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER". Jurnal Komputer dan Informatika 9, n.º 1 (10 de marzo de 2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.
Texto completoCharke, A. Ben, M. Chabi y M. Fakir. "Contribution to the Security of the Information System". TELKOMNIKA Indonesian Journal of Electrical Engineering 16, n.º 1 (1 de octubre de 2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Texto completoQiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework". International Journal of Emerging Technologies in Learning (iJET) 14, n.º 16 (29 de agosto de 2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.
Texto completoTesis sobre el tema "SSH SHELL"
Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK". DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.
Texto completoEngkvist, Tobias. "Remote Netlab". Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.
Texto completoThe projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
Prasetijo, Agung Budi. "Application-level proxy firewalls". Thesis, Queensland University of Technology, 2001.
Buscar texto completoHuebner, U., Grunewald, Heide, Huettmann y Trapp. "Mitteilungen des URZ 2/1998". Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.
Texto completoLin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method". Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.
Texto completoCaleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact". Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.
Texto completoNassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes". Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.
Texto completoMurphy, Michael W. y Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.
Texto completoThis thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Texto completoKUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.
Texto completoLibros sobre el tema "SSH SHELL"
Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.
Buscar texto completoByrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Editado por Mike Loukides. 2a ed. Beijing: O'Reilly Media, 2005.
Buscar texto completoLoukides, Mike, ed. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.
Buscar texto completoImplementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.
Buscar texto completoLiu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.
Buscar texto completoOn command: Writing a Unix-like shell for MS-DOS. 2a ed. Redwood City, CA: M & T Books, 1987.
Buscar texto completoNext generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.
Buscar texto completoBerṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.
Buscar texto completoBar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.
Buscar texto completoBet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.
Buscar texto completoCapítulos de libros sobre el tema "SSH SHELL"
Schwenk, Jörg. "Secure Shell (SSH)". En Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.
Texto completoSchwenk, Jörg. "Secure Shell (SSH)". En Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.
Texto completoLa Lau, Robert. "Secure Shell (SSH)". En Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.
Texto completoJordan, Vladimir y Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS". En Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.
Texto completoKambourakis, Georgios, Angelos Rouskas y Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections". En Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.
Texto completo"Networking Fundamentals". En Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.
Texto completoDzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari y Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal". En Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.
Texto completoPulkkis, Göran, Kaj J. Grahn y Peik Åström. "Network Security Software". En Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.
Texto completoPollayi, Hemaraju, Prathyusha Bandaru y Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations". En Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.
Texto completoChalaev, Djamalutdin y Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES". En Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.
Texto completoActas de conferencias sobre el tema "SSH SHELL"
Iyappan, P., K. S. Arvind, N. Geetha y S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol". En 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.
Texto completoBergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk y Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol". En CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.
Texto completoMegalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram y Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)". En 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.
Texto completoVinayakumar, R., K. P. Soman y Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis". En 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.
Texto completoVinayakumar, R., K. P. Soman y Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks". En 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.
Texto completoMalik, Najmus Saqib, David Ko y Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems". En ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Texto completoDi Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni y Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater". En ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.
Texto completoZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus y Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". En Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Texto completoZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus y Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". En Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Texto completoA.A., Grishina, Toropova T. N. y Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)". En All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.
Texto completoInformes sobre el tema "SSH SHELL"
Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Editado por C. Lonvick. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4251.
Texto completoYlonen, T. The Secure Shell (SSH) Authentication Protocol. Editado por C. Lonvick. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4252.
Texto completoYlonen, T. The Secure Shell (SSH) Connection Protocol. Editado por C. Lonvick. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4254.
Texto completoVelvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, abril de 2020. http://dx.doi.org/10.17487/rfc8758.
Texto completoLehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Editado por C. Lonvick. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4250.
Texto completoYlonen, T. The Secure Shell (SSH) Transport Layer Protocol. Editado por C. Lonvick. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4253.
Texto completoTatham, S. y D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, abril de 2017. http://dx.doi.org/10.17487/rfc8160.
Texto completoGalbraith, J. y P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4335.
Texto completoBellare, M., T. Kohno y C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, enero de 2006. http://dx.doi.org/10.17487/rfc4344.
Texto completoGalbraith, J. y R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, noviembre de 2006. http://dx.doi.org/10.17487/rfc4716.
Texto completo