Gotowa bibliografia na temat „SSH SHELL”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SSH SHELL”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "SSH SHELL"

1

Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH". Jurnal Teknologi Informasi 4, nr 1 (2.06.2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.

Pełny tekst źródła
Streszczenie:
Abstract - System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH) to enter the system with a secure channel. By default, SSH is not secure because there is a great chance that the account will be taken over by brute force techniques. The application of asymmetric cryptography on SSH accounts is considered safe than SSH remote login by default. However, this is still not enough because hackers could control the computer that is used by administrators to do remote servers. It also can be hacked with key scanning techniques. The combination of asymmetric cryptography and two-step authentication can be a solution so that the server will be very difficult to penetrate.Keywords - Server Security, SSH, Asymmetric Cryptosystems, Two-Step Authentication.Abstrak - Keamanan sistem menjadi syarat mutlak yang harus diperhatikan oleh pengguna, khususnya administrator jaringan guna melindungi data. Setiap melakukan pemeliharaan dan monitoring sistem, seorang administrator membutuhkan akses masuk dengan cara remote seperti secure shell (SSH) ke dalam sistem dengan saluran yang aman. Secara default, SSH tidak aman karena berpeluang besar akun diambil alih dengan teknik brute force. Penerapan kriptografi asimetris pada akun SSH dinilai aman daripada remote login SSH secara default. Akan tetapi hal tersebut masih belum cukup karena bisa saja peretas justru mengendalikan komputer yang digunakan oleh administrator dalam melakukan remote server. Selain itu juga dapat diretas dengan teknik key scanning. Kombinasi kriptografi asimetris dan autentikasi dua langkah dapat menjadi solusi sehingga server akan sangat susah ditembus.Kata Kunci – Keamanan Server, SSH, Kriptografi Asimetris, Autentikasi Dua Langkah.
Style APA, Harvard, Vancouver, ISO itp.
2

Hidayat, Muh Adrian Juniarta, i Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies". Infotek : Jurnal Informatika dan Teknologi 6, nr 2 (20.07.2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.

Pełny tekst źródła
Streszczenie:
The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh) access system using the port knock method and a security system to prevent Denial of Service (DoS) attacks on server computers using the RST Cookies method. The simulation results from the port 22 Secure Shell (SSH) access experiment for the server computer can work well where port 22 Secure Shell(SSH) will remain closed and cannot be accessed carelessly except by accessing several ports first according to predefined port knocking rules. Likewise, the implementation of a security system with the RST Cookies method works very well to prevent Denial of Service (DoS) attacks and can still keep the server accessible with a good response time of under 1 ms
Style APA, Harvard, Vancouver, ISO itp.
3

Costa, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões i Pedro R. M. Inácio. "Theoretical and practical assessments over SSH". Research and Practice in Technology Enhanced Learning 18 (2.01.2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.

Pełny tekst źródła
Streszczenie:
During the COVID-19 pandemic, universities worldwide were forced to close, causing a shift from presential to remote classes. This situation motivated teachers to find suitable tools to evaluate students remotely, fairly, and accurately. However, currently available systems are either survey or exercise evaluation based, not suitable for competency-based assessments. Faced with this context and limitations of available evaluation systems, we developed TestsOverSSH, a system to devise, deliver, and automatically correct assessments performed in a Command Line Interface (CLI) environment. Unique assessments are generated per student when they access the proposed system via Secure SHell (SSH). TestsOverSSH is composed of shell scripts that orchestrate a series of tools and services that come pre-installed in Linux distributions. It can be used to construct multiple-choice or direct answer questions while also requiring students to perform tasks in the environment per se, namely computer programming or CLI manipulation-related assignments. We present examples of the question types in this system, explaining question formats and operating guidelines. Since the assessments are directly performed in the system, logs and command history can be easily retrieved while keeping information within student devices uncollected. We performed evaluations using this system in a real context and obtained student feedback through a custom survey and the System Usability Scale (SUS). Survey results and SUS score suggest that TestsOverSSH is an intuitive evaluation tool, with eased access and usage, making it applicable for e-learning.
Style APA, Harvard, Vancouver, ISO itp.
4

Ramadhan, Rizky, Jonny Latuny i Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN". Jurnal ISOMETRI 1, nr 1 (31.05.2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.

Pełny tekst źródła
Streszczenie:
Penelitian ini membahas mengenai pemanfaatan firewall dan fail2ban yang dikembangkan menggunakan IpTables guna mengamankan suatu web server dari serangan atau percobaan akses dari pihak-pihak yang tidak berkepentingan. Pemanfaatan firewall dan fail2ban bertujuan agar web server serta aplikasi-aplikasi online yang digunakan aman dari akses pihak-pihak yang tidak berkepentingan serta mencegah pencurian data-data yang sensitive. Implementasi fail2ban dilakukan dengan fokus kepada mengamankan akses koneksi SSH (secure shell) dimana fail2ban digunakan untuk memblok/memfilter IP Address yang melakukan percobaan koneksi secara beruntun (3x) dan yang masuk ke kriteria serangan. Hasilnya adalah daftar IP Address yang diblok aksesnya setelah 3x gagal melakukan koneksi ke layanan SSH (secure shell) pada web server dari detail filtering fail2ban diambil sampel IP Address, domain, negara, dan lain-lain yang memberikan indikasi bahwa system firewall yang diterapkan dapat berfungsi dengan benar.
Style APA, Harvard, Vancouver, ISO itp.
5

Desmira, Desmira, i Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking". INSANtek 3, nr 1 (31.05.2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.

Pełny tekst źródła
Streszczenie:
Banten Tour Mandiri merupakan penyedia layanan Tour dan Travel, kebutuhan dalam penggunaan internet pada perusahaan sangat dibutuhkan agar pelayanan dalam bidang jasa dapat terlaksana dengan nyaman dan efektif. Penelitian ini bertujuan 1.Merancang sistem remote menggunakan port knocking untuk memmantau dan mengawasi akses jaringan internet pada PT. Banten Tour Mandiri. 2. Mengawasi jaringan internet pada lingkungan PT. Banten Tour Mandiri. 3.Memudahkan perusahaan dalam mengelola, mengawasi saat menggunakan jaringan internet yang ada di lingkungan perusahaan. Untuk mengembagkan kesetabilan jaringan internet yang ada, namun ada beberapa hal yang belum diperhatikan dan diimplementasikan, yaitu keamanan dan pengawasan terhadap jaringan internet, maka dibutuhkannya suatu sistem keamanan jaringan yang mempermudah pengamanan dan pengawasan, dengan malakukan Rancang Bangun Kemanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking Di PT. Banten Tour Mandiri. Hasil penelitian ini terlihat administrator berhasil melakukan akses remote terhadap server jaringan internet menggunakan port ssh. Pemantauan dan pengelolaan keamanan jaringan internet dapat dilakukan menggunakan PC yang berbeda yang berada pada lingkukan PT. Banten Tour Mandiri
Style APA, Harvard, Vancouver, ISO itp.
6

Desmira, Desmira, i Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking". Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, nr 1 (3.03.2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.

Pełny tekst źródła
Streszczenie:
PT. Banten Tour Mandiri is a tour and travel service provider, the need for internet use in companies is very much needed so that services in the service sector can be carried out comfortably and effectively. This study aims 1. To design a remote system using port knocking to monitor and supervise internet network access at PT. Banten Tour Mandiri. 2. Overseeing the internet network at PT. Banten Tour Mandiri. 3. Make it easier for companies to manage, supervise when using the existing internet network in the corporate environment. To develop the stability of the existing internet network, but there are several things that have not been considered and implemented, namely security and supervision of the internet network, it is necessary to have a network security system that simplifies security and supervision, by performing the Secure Shell (SSH) Port Security Design Port Knocking Method At PT. Banten Tour Mandiri. The results of this study show that the administrator has successfully performed remote access to the internet network server using the SSH port. Monitoring and management of internet network security can be done using a different PC located in the PT. Banten Tour Mandiri
Style APA, Harvard, Vancouver, ISO itp.
7

Zuzcák, Matej, i Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks". Computer Science and Information Systems, nr 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.

Pełny tekst źródła
Streszczenie:
A large number of cyber attacks are commonly conducted against home computers, mobile devices, as well as servers providing various services. One such prominently attacked service, or a protocol in this case, is the Secure Shell (SSH) used to gain remote access to manage systems. Besides hu man attackers, botnets are a major source of attacks on SSH servers. Tools such as honeypots allow an effective means of recording and analysing such attacks. However, is it also possible to use them to effectively predict these attacks? The prediction of SSH attacks, specifically the prediction of activity on certain subjects, such as autonomous systems, will be beneficial to system administrators, internet service providers, and CSIRT teams. This article presents multiple methods for using a time series, based on real-world data, to predict these attacks. It focuses on the overall prediction of attacks on the honeynet and the prediction of attacks from specific geographical regions. Multiple approaches are used, such as ARIMA, SARIMA, GARCH, and Bootstrapping. The article presents the viability, precision and usefulness of the individual approaches for various areas of IT security.
Style APA, Harvard, Vancouver, ISO itp.
8

Djayali, Abdul Djalil, Rifaldi Nurdin i Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER". Jurnal Komputer dan Informatika 9, nr 1 (10.03.2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.

Pełny tekst źródła
Streszczenie:
Keamanan berbanding terbalik dengan kenyamanan, semakin nyaman dalam penerapan teknologi maka akan berdampak pada sisi keamanan sistem. Server merupakan salah satu infratruktur yang penting dalam mengelolah data. Mencegah serangan pada Server penting untuk dilakukan. Penerapan firewall dapat meminimalisir serangan yang membahayakan Server. Salah satunya dengan menerapkan aplikasi Intrusion Detection System (IDS) seperti Snort yang memiliki kemampuan untuk mendeteksi serangan yang terjadi pada sistem Server. Pada penelitian ini, penulis melakukan pengembangan sistem yang diberi nama R-Wall. Penerapan R-Wall bertujuan untuk mampu memonitor dan mengamankan server terhadap beberapa metode serangan, antara lain yaitu distribution denial of service (DDoS) ping of death, port scanning, brute force pada layanan file transfer protocol (FTP) dan brute force pada layanan secure shell (SSH). Hasil penerapan ini mampu memberikan notifikasi serangan yang dikirimkan melalui robot Telegram dengan total 247 serangan DDoS ping of death, 8 serangan port scanning, 247 serangan brute force pada layanan FTP dan 208 serangan pada layanan brute force SSH. R-Wall juga mampu melakukan pembatasan akses terhadap penyerang.
Style APA, Harvard, Vancouver, ISO itp.
9

Charke, A. Ben, M. Chabi i M. Fakir. "Contribution to the Security of the Information System". TELKOMNIKA Indonesian Journal of Electrical Engineering 16, nr 1 (1.10.2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.

Pełny tekst źródła
Streszczenie:
Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.
Style APA, Harvard, Vancouver, ISO itp.
10

Qiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework". International Journal of Emerging Technologies in Learning (iJET) 14, nr 16 (29.08.2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.

Pełny tekst źródła
Streszczenie:
With the aid of information-based teaching platform, the traditional classroom English teaching mode can be improved to provide students with a realistic linguistic environment and enhance their learning interest. As a result, the web-based computer aided English teaching has become the mainstream in college English education. Based on the browser/server (B/S) structure, this paper designs a computer-aided English teaching platform of the model–view–controller (MVC) architectural pattern. The programming was carried out using the MySQL database, and the functions of the computer-aided English teaching platform were realized securely and stably by the popular Secure Shell (SSH) framework. The system test results show that the proposed platform supports the open teaching of college English, solves the lack of interaction in traditional classroom teaching, and arouses the students’ learning interest. The research further promotes the reform of college English teaching, and enriches the theories and practices on computer-aided English teaching.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "SSH SHELL"

1

Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK". DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.

Pełny tekst źródła
Streszczenie:
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each keystroke entered to the server as soon as it becomes available. As a result, an attacker can observe the network patterns to know when a user presses a key and draw conclusions based on that information such as what a user is typing or who they are. In this thesis, we demonstrate that such an attack allows a malicious observer to identify a user with a concerning level of accuracy without having direct access to either the client or server systems. Using machine learning classifiers, we identify individual users in a crowd based solely on the size and timing of packets traveling across the network. We find that our classifiers were able to identify users with 20\% accuracy using as little as one hour of network traffic. Two of them promise to scale well to the number of users.
Style APA, Harvard, Vancouver, ISO itp.
2

Engkvist, Tobias. "Remote Netlab". Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.

Pełny tekst źródła
Streszczenie:
Detta projekt har haft som fokus att skapa ett system där användare med hjälp av SSH ska kunna logga in på en server och utföra konfigurationer på switchar och routrar med olika krav såsom att enbart en användare får vara inloggad i systemet åt gången. För att uppnå målen och kraven så användes ett par olika skript med språk såsom shell, bash, perl och expect. Resultatet visar en färdig produkt och att detta projekt var genomförbart. Lösningsförslaget finns presenterat i form av ett flödesschema och sedan vanlig text. Slutligen presenteras och diskuteras även andra alternativa lösningar.
The projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
Style APA, Harvard, Vancouver, ISO itp.
3

Prasetijo, Agung Budi. "Application-level proxy firewalls". Thesis, Queensland University of Technology, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Huebner, U., Grunewald, Heide, Huettmann i Trapp. "Mitteilungen des URZ 2/1998". Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.

Pełny tekst źródła
Streszczenie:
Perspektiven im Netzbereich C.A.N. - Chemnitzer AbsolventenNetz Grafische Benutzeroberfl¨achen im Netz (VNC) PGP 5.x und GNUPG Neuigkeiten bei der Secure Shell (SSH) Vim 5.x Richtlinien zur Sicherheit im Campusnetz Ein Jahr Einsatz von Windows NT im URZ
Style APA, Harvard, Vancouver, ISO itp.
5

Lin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method". Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.

Pełny tekst źródła
Streszczenie:
The objective of this thesis is the development and the extension of the SPH method for the analysis of isotropic and multilayered composite shell structures, undergoing dynamic loading. Major defects of the classical SPH method such as the lack of consistency, the tensile instability are solved by "Corrective Smoothed Particle Method", the use of the Total Lagrangian Formulation and artificial viscosity. Mindlin-Reissner Theory is employed for the modeling of thick shells, by using only one layer of particles in the mid-plane. The strong form of the governing equations for shell structures are discretized directly by the modified SPH method and solved using the central difference time integration scheme. An extension of the method has been introduced for the modeling of low-velocity impact of shells by rigid impactors. The contact force is calculated based on the Hertzian contact law. A last extension of the SPH method concerns the integration of Tsai-Wu failure criterion for the modeling of progressive degradation of multilayered structures.
Style APA, Harvard, Vancouver, ISO itp.
6

Caleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact". Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.

Pełny tekst źródła
Streszczenie:
Le récent développement des menaces terroristes renforce l'effort de recherche du CEA et d'EDF pour la protection des citoyens et des installations. De nombreux scénarios doivent être envisagés comme, par exemple, la chute d'un avion de ligne sur une structure de génie civil. La dispersion du carburant dans la structure, son embrasement sous forme de boule de feu et les effets thermiques associés sont des éléments essentiels du problème. L'utilisation de modèles numériques est indispensable car des expériences seraient difficiles à mettre en œuvre, coûteuses et dangereuses. Le problème type que l'on cherche à modéliser est donc l'impact d'un réservoir rempli de fluide, sa déchirure et la dispersion de son contenu. C'est un problème complexe qui fait intervenir une structure mince avec un comportement fortement non-linéaire allant jusqu'à rupture, un fluide dont la surface libre peut varier drastiquement et des interactions fluide-structure non permanentes. L'utilisation des méthodes numériques traditionnelles pour résoudre ce problème semble difficile, essentiellement parce qu'elles reposent sur un maillage. Cela complique la gestion des grandes déformations, la modélisation des interfaces variables et l'introduction de discontinuités telles que les fissures. Afin de s'affranchir de ces problèmes, la méthode sans maillage SPH (\og Smoothed Particle Hydrodynamics \fg) a été utilisée pour modéliser le fluide et la structure. Ce travail, inscrit dans la continuité de recherches précédentes, a permis d'étendre un modèle de coque SPH à la modélisation des ruptures. Un algorithme de gestion des interactions fluide-structure a également été adapté à la topologie particulière des coques. Afin de réduire les coûts de calcul importants liés à ce modèle, un couplage avec la méthode des éléments finis a également été élaboré. Il permet de n'utiliser les SPH que dans les zones d'intérêt où la rupture est attendue. Finalement, des essais réalisés par l'ONERA sont étudiés pour valider la méthode. Ces travaux ont permis de doter le logiciel de dynamique rapide Europlexus d'un outil original et efficace pour la simulation des impacts de structures minces en interaction avec un fluide. Un calcul démonstratif montre enfin la pertinence de l'approche et sa mise en œuvre dans un cadre industriel.
Style APA, Harvard, Vancouver, ISO itp.
7

Nassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes". Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.

Pełny tekst źródła
Streszczenie:
The purpose of the work described in this thesis was to explore the use of fractional crystallization as a technology that can be used to separate medium-curie waste from the Hanford Site tank farms into a high-curie waste stream, which can be sent to a Waste Treatment and Immobilization Plant (WTP), and a low-curie waste stream, which can be sent to Bulk Vitrification. The successful semi-batch crystallization of sodium salts from two single shell tank simulant solutions (SST Early Feed, SST Late Feed) demonstrated that the recovered crystalline product met the purity requirement for exclusion of cesium, sodium recovery in the crystalline product and the requirement on the sulfate-to-sodium molar ratio in the stream to be diverted to the WTP. In this thesis, experimental apparatus, procedures and results are given on scaled-down experiments of SST Early Feed for hot-cell adaptation along with operating parameters and crystallization mechanism studies on early feed multi-solute crystallization. Moreover, guidance is given regarding future steps towards adapting the technology to multi-salt crystallization kinetic parameter estimates and modeling. Crystallization, Evaporative Fractional Crystallization, Nuclear Waste Pretreatment, Cesium Removal, Hanford, SST Early and Late feed, Multi-solute, Multi-salts, Simulant Testing
Style APA, Harvard, Vancouver, ISO itp.
8

Murphy, Michael W., i Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution in unlimited.
This thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
Style APA, Harvard, Vancouver, ISO itp.
9

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Pełny tekst źródła
Streszczenie:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Style APA, Harvard, Vancouver, ISO itp.
10

KUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.

Pełny tekst źródła
Streszczenie:
Many government agencies and businesses are focusing on security issues because of cybercrime. If we talk about Facebook which maintains large data for every user account but provides little privacy since privacy is very essential factor nowadays. Security helps in gain of the user’s interest and increase the growth of business. Privacy-Preservation is an important feature for any individual since his personal data should not be accessible to unauthorized people. In recent years, data mining has been viewed as a threat to privacy because wide range of data is spread in digital form by many companies. The data is stored in digital form in the computer. So some privacy should be preserved during data collection and data mining. Nowadays there are so many attackers attacking our data. That’s why privacy is so important factor that reduces the chances of attacks and increase the security. In this project, we proposed a method for processing the data file in encrypted form that is unreadable by unauthorized user and reduces the encryption and decryption time as compared to AES. This research also shows the results that have been practically proved by the implementation of existing algorithm and proposed algorithm. In proposed algorithm, we can execute the dataset that can be of size greater than computer RAM which cannot be done in AES. To give an approach for HDFS environment, useful for the improvement of HDFS Hadoop while dealing with big data, Privacy- Preservation should be our main concern. This Means, in HDFS the data is in plain form, which can be accessed and misused by anyone. So data should be in encrypted form to provide the privacy because even if a small piece of information is leaked by attacker, then it becomes difficult to handle data of TBs. So this approach for HDFS environment can be used to preserve the privacy. Here I have also compared the results with different kinds of parameters. The approach used here breaks the file into blocks and then block level encryption is used. The main objective here is to reduce the time of encryption and preserve the privacy to increase the security in HDFS environment.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "SSH SHELL"

1

Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Byrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Redaktor Mike Loukides. Wyd. 2. Beijing: O'Reilly Media, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Loukides, Mike, red. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Implementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

On command: Writing a Unix-like shell for MS-DOS. Wyd. 2. Redwood City, CA: M & T Books, 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Next generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Berṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "SSH SHELL"

1

Schwenk, Jörg. "Secure Shell (SSH)". W Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Schwenk, Jörg. "Secure Shell (SSH)". W Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

La Lau, Robert. "Secure Shell (SSH)". W Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jordan, Vladimir, i Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS". W Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kambourakis, Georgios, Angelos Rouskas i Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections". W Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.

Pełny tekst źródła
Streszczenie:
Security is always an important factor in wireless connections. As with all other existing radio technologies, the Bluetooth standard is often cited to suffer from various vulnerabilities and security inefficiencies while attempting to optimize the trade-off between performance and complementary services including security. On the other hand, security protocols like IP secure (IPsec) and secure shell (SSH) provide strong, flexible, low cost, and easy to implement solutions for exchanging data over insecure communication links. However, the employment of such robust security mechanisms in wireless realms enjoins additional research efforts due to several limitations of the radio-based connections, for example, link bandwidth and unreliability. This chapter will evaluate several Bluetooth personal area network (PAN) parameters, including absolute transfer times, link capacity, throughput, and goodput. Experiments shall employ both Bluetooth native security mechanisms, as well as the two aforementioned protocols. Through a plethora of scenarios utilizing both laptops and palmtops, we offer a comprehensive in-depth comparative analysis of each of the aforementioned security mechanisms when deployed over Bluetooth communication links.
Style APA, Harvard, Vancouver, ISO itp.
6

"Networking Fundamentals". W Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Pełny tekst źródła
Streszczenie:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
Style APA, Harvard, Vancouver, ISO itp.
7

Dzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari i Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal". W Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.

Pełny tekst źródła
Streszczenie:
Mollusk shell is abundant in particular areas and frequently deposited in landfills, contributing to environmental pollution. However, mollusk shell waste has been proven as an absorbent that has a high possibility of acting as a photocatalyst when integrated with metal support in composite form due to the synergistic effect. Therefore, in this study, mussel and cockle shells as agricultural wastes were selected to be innovated as support for photocatalysts. The solid-state dispersion (SSD) method was used to prepare a composite photocatalyst where mussel and cockle were integrated with titanium dioxide (TiO2) nanoparticles at a ratio of 9:1. In total, 100% of mussel and cockle were used as control samples. The prepared composite photocatalyst was evaluated with methylene blue (MB) removal in the suspension system. The result reveals that mussel/TiO2 and cockle/TiO2 composite photocatalyst show 25.92 and 24.08% for MB removal within 2 hours. It is due to the prepared composite photocatalyst particle sizes, where mussel/TiO2 and cockle/TiO2 were 259 and 268 nm, respectively. It is interesting to note that the prepared composite photocatalyst particle size should be in nanosize, where it can enhance the photocatalytic performance. Overall, agricultural waste should be utilized to ensure a clean environment for future generations.
Style APA, Harvard, Vancouver, ISO itp.
8

Pulkkis, Göran, Kaj J. Grahn i Peik Åström. "Network Security Software". W Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.

Pełny tekst źródła
Streszczenie:
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security specialists. Covered topics are protection against viruses and other malicious programs, firewall software, cryptographic software standards like IPSec and TLS/SSL, cryptographic network applications like Virtual Private Networks, secure Web, secure email, Secure Electronic Transaction, Secure Shell, secure network management, secure DNS and smartcard applications, as well as security administration software like intrusion detectors, port scanners, password crackers and management of network security software management. Tools and API’s for security software development are presented. A four-level network security software skill taxonomy is proposed and implications of this taxonomy on network security education is outlined. University and polytechnic level network security education is surveyed and the need for inclusion of network security software development skills in such education is pointed out.
Style APA, Harvard, Vancouver, ISO itp.
9

Pollayi, Hemaraju, Prathyusha Bandaru i Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations". W Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.

Pełny tekst źródła
Streszczenie:
In the chapter, the authors develop a machine learning (ML)-based model that has the potential to make rapid predictions for seismic responses with SSI effects and determine the seismic performance levels. The authors select several input parameters for training, validation, and testing of the present model. The present high speed and accurate data generation methods can be incorporated as a tool for safe seismic assessment and design of sustainable earthquake resistant structures. Finally, the authors will test the soil-pile model experimentally on a shake table (with strain gauges and accelerometers) when subjected to harmonic load with varying frequencies in the range 3Hz to 12Hz and base acceleration ranging from 0.05g to 0.3g. The present approach shall provide substantial information for design of piles and the response of piles subjected to earthquake excitations.
Style APA, Harvard, Vancouver, ISO itp.
10

Chalaev, Djamalutdin, i Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES". W Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.

Pełny tekst źródła
Streszczenie:
The use of advanced heat transfer surfaces (corrugated tubes of various modifications) is an effective way to intensify the heat transfer and improve the hydraulic characteristics of tubular heat exchangers. The methods for evaluating the use of such surfaces as working elements in tubular heat exchangers have not been developed so far. The thermal and hydrodynamic processes occurring in the tubes with the developed surfaces were studied to evaluate the efficiency of heat exchange therein. Thin-walled corrugated flexible stainless steel tubes of various modifications were used in experimental studies. The researches were carried out on a laboratory stand, which was designed as a heat exchanger type "tube in tube" with a corrugated inner tube. The stand was equipped with sensors to measure the thermal hydraulic flow conditions. The comparative analysis of operation modes of the heat exchanger with a corrugated inner tube of various modifications and the heat exchanger with a smooth inner tube was performed according to the obtained data. Materials and methods. A convective component of the heat transfer coefficient of corrugated tube increased significantly at identical flow conditions comparing with a smooth tube. Increasing the heat transfer coefficient was in the range of 2.0 to 2.6, and increased with increasing Reynolds number. The increase in heat transfer of specified range outstripped the gain of hydraulic resistance caused by increase of the flow. Results and discussion. CFD model in the software ANSYS CFX 14.5 was adapted to estimate the effect of the tube geometry on the intensity of the heat transfer process. A two-dimensional axially symmetric computer model was used for the calculation. The model is based on Reynolds equation (Navier-Stokes equations for turbulent flow), the continuity equation and the energy equation supplemented by the conditions of uniqueness. SST-turbulence model was used for the solution of the equations. The problem was solved in the conjugate formulation, which allowed assessing the efficiency of heat exchange, depending on various parameters (coolant temperature, coolant velocity, pressure). The criteria dependences were obtained Nu = f (Re, Pr). Conclusions. The use a corrugated tube as a working element in tubular heat exchangers can improve the heat transfer coefficient of 2.0 - 2.6 times, with an increase in hydraulic resistance in the heat exchanger of 2 times (compared with the use of smooth tubes). The criteria dependences obtained on the basis of experimental studies and mathematical modeling allow developing a methodology for engineering calculations for the design of new efficient heat exchangers with corrugated tubes.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "SSH SHELL"

1

Iyappan, P., K. S. Arvind, N. Geetha i S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol". W 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk i Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol". W CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Megalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram i Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)". W 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Vinayakumar, R., K. P. Soman i Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis". W 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Vinayakumar, R., K. P. Soman i Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks". W 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Malik, Najmus Saqib, David Ko i Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems". W ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.

Pełny tekst źródła
Streszczenie:
This paper describes a secure migration process of mobile agents between agencies. Mobile-C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi-agent platform for supporting C/C++ mobile and stationary agents. This secure migration process is inspired from Secure Shell (SSH). Before migration, both agencies authenticate each other using public key authentication. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified. Mobile-C is specially designed for mechatronic and factory automation systems where, for correct system operations, agencies must accept mobile agents from trusted agencies. For this reason, the emphasis is on strong authentication of both agencies involved in migration process. Security aspects of other popular mobile agent systems are described briefly. A comparison study with SSH protocol is performed and future work is elaborated.
Style APA, Harvard, Vancouver, ISO itp.
7

Di Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni i Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater". W ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.

Pełny tekst źródła
Streszczenie:
A steam superheater is a component which operates at elevated temperature in the creep regime. The component is normally not working in cycling conditions. Due to operation failures, the component has been subjected to several unplanned start-ups and shutdown. The SSH has reported a very high level of damage of the tubesheet to shell junction in field (high deformation and weld cracks). Several investigations have been performed to analyze the effect of temperature, pressure and external loads on the equipment with finite element techniques and different creep and creep-fatigue evaluation approaches: ASME III subsection NH, simplified inelastic analysis and a full creep model have been used. A comparison of the results is reported in this paper. Paper published with permission.
Style APA, Harvard, Vancouver, ISO itp.
8

Zarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus i Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". W Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.

Pełny tekst źródła
Streszczenie:
Abstract Hurricane Ida made landfall in Port Fourchon, Louisiana, as a Category 4 hurricane on August 29th, 2021, traveling over some offshore oil and gas facilities on its path. Shell Exploration and Production's offshore oil and gas installations in the Gulf of Mexico (GoM) have the most comprehensive suite of metocean instrumentation in the region, including wave and wind systems that captured the passage of hurricane Ida. This paper analyzes the wind and wave conditions measured by some Shell facilities located along the path of hurricane Ida. The number of LiDAR wind profilers and their spatial distribution with respect to Ida makes Shell the only operator in the Gulf of Mexico able to provide a detailed vertical wind profile at multiple locations throughout the extreme wind event. These observations, combined with satellite products such as Sea Surface Height (SSH) and Sea Surface Temperature (SST), help understand the hurricane track and intensity. Three Shell Tension Leg Platforms (TLPs) and one Semi-Submersible offshore Louisiana, measured wave data, with an overall maximum wave height of 21 m and a maximum significant wave height of 13 m. Two Shell TLPs and one Semi-Submersible measured wind profiles with maximum wind speeds of 46.82 ms−1 (91 knots, 104 mph), 43.52 ms−1 (84 knots, 97 mph), and 39.95 ms−1 (77 knots, 89 mph). Out of those three Platforms, the two sites that captured the strongest wind speeds were located right on Ida's path, where it was possible to record the wind direction shift as Hurricane Ida passed over the, and the third site was east of the track.
Style APA, Harvard, Vancouver, ISO itp.
9

Zarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus i Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". W Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.

Pełny tekst źródła
Streszczenie:
Abstract Hurricane Ida made landfall in Port Fourchon, Louisiana, as a Category 4 hurricane on August 29th, 2021, traveling over some offshore oil and gas facilities on its path. Shell Exploration and Production's offshore oil and gas installations in the Gulf of Mexico (GoM) have the most comprehensive suite of metocean instrumentation in the region, including wave and wind systems that captured the passage of hurricane Ida. This paper analyzes the wind and wave conditions measured by some Shell facilities located along the path of hurricane Ida. The number of LiDAR wind profilers and their spatial distribution with respect to Ida makes Shell the only operator in the Gulf of Mexico able to provide a detailed vertical wind profile at multiple locations throughout the extreme wind event. These observations, combined with satellite products such as Sea Surface Height (SSH) and Sea Surface Temperature (SST), help understand the hurricane track and intensity. Three Shell Tension Leg Platforms (TLPs) and one Semi-Submersible offshore Louisiana, measured wave data, with an overall maximum wave height of 21 m and a maximum significant wave height of 13 m. Two Shell TLPs and one Semi-Submersible measured wind profiles with maximum wind speeds of 46.82 ms−1 (91 knots, 104 mph), 43.52 ms−1 (84 knots, 97 mph), and 39.95 ms−1 (77 knots, 89 mph). Out of those three Platforms, the two sites that captured the strongest wind speeds were located right on Ida's path, where it was possible to record the wind direction shift as Hurricane Ida passed over the, and the third site was east of the track.
Style APA, Harvard, Vancouver, ISO itp.
10

A.A., Grishina, Toropova T. N. i Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)". W All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.

Pełny tekst źródła
Streszczenie:
This article is devoted to the study of the geological structure of shallow-water Cretaceous sediments of the Podpimsky SSK in the area of the junction of the Rassokhinsky megashaft and the Agapsky trough. The analysis of complex geological and geophysical information made it possible to detail the geological structure of the Podpimsky SSC, map the zones of distribution of improved reservoirs and identify promising objects in the shallow shelf zone of the Podpimsky SSC, including non-anticlinal ones.
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "SSH SHELL"

1

Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4251.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ylonen, T. The Secure Shell (SSH) Authentication Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4252.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ylonen, T. The Secure Shell (SSH) Connection Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4254.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Velvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, kwiecień 2020. http://dx.doi.org/10.17487/rfc8758.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Lehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4250.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ylonen, T. The Secure Shell (SSH) Transport Layer Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4253.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Tatham, S., i D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, kwiecień 2017. http://dx.doi.org/10.17487/rfc8160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Galbraith, J., i P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4335.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Bellare, M., T. Kohno i C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4344.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Galbraith, J., i R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, listopad 2006. http://dx.doi.org/10.17487/rfc4716.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii