Gotowa bibliografia na temat „SSH SHELL”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „SSH SHELL”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "SSH SHELL"
Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH". Jurnal Teknologi Informasi 4, nr 1 (2.06.2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.
Pełny tekst źródłaHidayat, Muh Adrian Juniarta, i Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies". Infotek : Jurnal Informatika dan Teknologi 6, nr 2 (20.07.2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.
Pełny tekst źródłaCosta, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões i Pedro R. M. Inácio. "Theoretical and practical assessments over SSH". Research and Practice in Technology Enhanced Learning 18 (2.01.2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.
Pełny tekst źródłaRamadhan, Rizky, Jonny Latuny i Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN". Jurnal ISOMETRI 1, nr 1 (31.05.2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.
Pełny tekst źródłaDesmira, Desmira, i Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking". INSANtek 3, nr 1 (31.05.2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.
Pełny tekst źródłaDesmira, Desmira, i Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking". Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, nr 1 (3.03.2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.
Pełny tekst źródłaZuzcák, Matej, i Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks". Computer Science and Information Systems, nr 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Pełny tekst źródłaDjayali, Abdul Djalil, Rifaldi Nurdin i Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER". Jurnal Komputer dan Informatika 9, nr 1 (10.03.2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.
Pełny tekst źródłaCharke, A. Ben, M. Chabi i M. Fakir. "Contribution to the Security of the Information System". TELKOMNIKA Indonesian Journal of Electrical Engineering 16, nr 1 (1.10.2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Pełny tekst źródłaQiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework". International Journal of Emerging Technologies in Learning (iJET) 14, nr 16 (29.08.2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.
Pełny tekst źródłaRozprawy doktorskie na temat "SSH SHELL"
Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK". DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.
Pełny tekst źródłaEngkvist, Tobias. "Remote Netlab". Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.
Pełny tekst źródłaThe projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
Prasetijo, Agung Budi. "Application-level proxy firewalls". Thesis, Queensland University of Technology, 2001.
Znajdź pełny tekst źródłaHuebner, U., Grunewald, Heide, Huettmann i Trapp. "Mitteilungen des URZ 2/1998". Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.
Pełny tekst źródłaLin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method". Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.
Pełny tekst źródłaCaleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact". Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.
Pełny tekst źródłaNassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes". Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.
Pełny tekst źródłaMurphy, Michael W., i Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.
Pełny tekst źródłaThis thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Pełny tekst źródłaKUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.
Pełny tekst źródłaKsiążki na temat "SSH SHELL"
Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.
Znajdź pełny tekst źródłaByrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Redaktor Mike Loukides. Wyd. 2. Beijing: O'Reilly Media, 2005.
Znajdź pełny tekst źródłaLoukides, Mike, red. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.
Znajdź pełny tekst źródłaImplementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.
Znajdź pełny tekst źródłaLiu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.
Znajdź pełny tekst źródłaOn command: Writing a Unix-like shell for MS-DOS. Wyd. 2. Redwood City, CA: M & T Books, 1987.
Znajdź pełny tekst źródłaNext generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.
Znajdź pełny tekst źródłaBerṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.
Znajdź pełny tekst źródłaBar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.
Znajdź pełny tekst źródłaBet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.
Znajdź pełny tekst źródłaCzęści książek na temat "SSH SHELL"
Schwenk, Jörg. "Secure Shell (SSH)". W Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.
Pełny tekst źródłaSchwenk, Jörg. "Secure Shell (SSH)". W Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.
Pełny tekst źródłaLa Lau, Robert. "Secure Shell (SSH)". W Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.
Pełny tekst źródłaJordan, Vladimir, i Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS". W Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.
Pełny tekst źródłaKambourakis, Georgios, Angelos Rouskas i Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections". W Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.
Pełny tekst źródła"Networking Fundamentals". W Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.
Pełny tekst źródłaDzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari i Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal". W Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.
Pełny tekst źródłaPulkkis, Göran, Kaj J. Grahn i Peik Åström. "Network Security Software". W Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.
Pełny tekst źródłaPollayi, Hemaraju, Prathyusha Bandaru i Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations". W Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.
Pełny tekst źródłaChalaev, Djamalutdin, i Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES". W Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.
Pełny tekst źródłaStreszczenia konferencji na temat "SSH SHELL"
Iyappan, P., K. S. Arvind, N. Geetha i S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol". W 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.
Pełny tekst źródłaBergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk i Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol". W CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.
Pełny tekst źródłaMegalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram i Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)". W 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.
Pełny tekst źródłaVinayakumar, R., K. P. Soman i Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis". W 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.
Pełny tekst źródłaVinayakumar, R., K. P. Soman i Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks". W 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.
Pełny tekst źródłaMalik, Najmus Saqib, David Ko i Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems". W ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Pełny tekst źródłaDi Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni i Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater". W ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.
Pełny tekst źródłaZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus i Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". W Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Pełny tekst źródłaZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus i Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities". W Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Pełny tekst źródłaA.A., Grishina, Toropova T. N. i Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)". W All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.
Pełny tekst źródłaRaporty organizacyjne na temat "SSH SHELL"
Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4251.
Pełny tekst źródłaYlonen, T. The Secure Shell (SSH) Authentication Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4252.
Pełny tekst źródłaYlonen, T. The Secure Shell (SSH) Connection Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4254.
Pełny tekst źródłaVelvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, kwiecień 2020. http://dx.doi.org/10.17487/rfc8758.
Pełny tekst źródłaLehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4250.
Pełny tekst źródłaYlonen, T. The Secure Shell (SSH) Transport Layer Protocol. Redaktor C. Lonvick. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4253.
Pełny tekst źródłaTatham, S., i D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, kwiecień 2017. http://dx.doi.org/10.17487/rfc8160.
Pełny tekst źródłaGalbraith, J., i P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4335.
Pełny tekst źródłaBellare, M., T. Kohno i C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, styczeń 2006. http://dx.doi.org/10.17487/rfc4344.
Pełny tekst źródłaGalbraith, J., i R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, listopad 2006. http://dx.doi.org/10.17487/rfc4716.
Pełny tekst źródła