Добірка наукової літератури з теми "SSH SHELL"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SSH SHELL".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SSH SHELL"
Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (June 2, 2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.
Повний текст джерелаHidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.
Повний текст джерелаCosta, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões, and Pedro R. M. Inácio. "Theoretical and practical assessments over SSH." Research and Practice in Technology Enhanced Learning 18 (January 2, 2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.
Повний текст джерелаRamadhan, Rizky, Jonny Latuny, and Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN." Jurnal ISOMETRI 1, no. 1 (May 31, 2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.
Повний текст джерелаDesmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking." INSANtek 3, no. 1 (May 31, 2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.
Повний текст джерелаDesmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking." Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, no. 1 (March 3, 2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.
Повний текст джерелаZuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.
Повний текст джерелаDjayali, Abdul Djalil, Rifaldi Nurdin, and Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER." Jurnal Komputer dan Informatika 9, no. 1 (March 10, 2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.
Повний текст джерелаCharke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (October 1, 2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.
Повний текст джерелаQiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework." International Journal of Emerging Technologies in Learning (iJET) 14, no. 16 (August 29, 2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.
Повний текст джерелаДисертації з теми "SSH SHELL"
Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.
Повний текст джерелаEngkvist, Tobias. "Remote Netlab." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.
Повний текст джерелаThe projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.
Знайти повний текст джерелаHuebner, U., Grunewald, Heide, Huettmann, and Trapp. "Mitteilungen des URZ 2/1998." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.
Повний текст джерелаLin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method." Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.
Повний текст джерелаCaleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.
Повний текст джерелаNassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.
Повний текст джерелаMurphy, Michael W., and Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.
Повний текст джерелаThis thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Повний текст джерелаKUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.
Повний текст джерелаКниги з теми "SSH SHELL"
Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.
Знайти повний текст джерелаByrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Edited by Mike Loukides. 2nd ed. Beijing: O'Reilly Media, 2005.
Знайти повний текст джерелаLoukides, Mike, ed. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.
Знайти повний текст джерелаImplementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.
Знайти повний текст джерелаLiu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.
Знайти повний текст джерелаOn command: Writing a Unix-like shell for MS-DOS. 2nd ed. Redwood City, CA: M & T Books, 1987.
Знайти повний текст джерелаNext generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.
Знайти повний текст джерелаBerṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.
Знайти повний текст джерелаBar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.
Знайти повний текст джерелаBet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.
Знайти повний текст джерелаЧастини книг з теми "SSH SHELL"
Schwenk, Jörg. "Secure Shell (SSH)." In Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.
Повний текст джерелаSchwenk, Jörg. "Secure Shell (SSH)." In Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.
Повний текст джерелаLa Lau, Robert. "Secure Shell (SSH)." In Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.
Повний текст джерелаJordan, Vladimir, and Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS." In Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.
Повний текст джерелаKambourakis, Georgios, Angelos Rouskas, and Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections." In Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.
Повний текст джерела"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.
Повний текст джерелаDzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari, and Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal." In Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.
Повний текст джерелаPulkkis, Göran, Kaj J. Grahn, and Peik Åström. "Network Security Software." In Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.
Повний текст джерелаPollayi, Hemaraju, Prathyusha Bandaru, and Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations." In Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.
Повний текст джерелаChalaev, Djamalutdin, and Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.
Повний текст джерелаТези доповідей конференцій з теми "SSH SHELL"
Iyappan, P., K. S. Arvind, N. Geetha, and S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol." In 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.
Повний текст джерелаBergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, and Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.
Повний текст джерелаMegalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram, and Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)." In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.
Повний текст джерелаVinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.
Повний текст джерелаVinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.
Повний текст джерелаMalik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.
Повний текст джерелаDi Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni, and Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater." In ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.
Повний текст джерелаZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Повний текст джерелаZarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.
Повний текст джерелаA.A., Grishina, Toropova T. N., and Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)." In All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.
Повний текст джерелаЗвіти організацій з теми "SSH SHELL"
Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4251.
Повний текст джерелаYlonen, T. The Secure Shell (SSH) Authentication Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4252.
Повний текст джерелаYlonen, T. The Secure Shell (SSH) Connection Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4254.
Повний текст джерелаVelvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, April 2020. http://dx.doi.org/10.17487/rfc8758.
Повний текст джерелаLehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4250.
Повний текст джерелаYlonen, T. The Secure Shell (SSH) Transport Layer Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4253.
Повний текст джерелаTatham, S., and D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8160.
Повний текст джерелаGalbraith, J., and P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4335.
Повний текст джерелаBellare, M., T. Kohno, and C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4344.
Повний текст джерелаGalbraith, J., and R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4716.
Повний текст джерела