Liu, 2011 - Google Patents
Next generation SSH2 implementation: securing data in motionLiu, 2011
- Document ID
- 9626589444148615179
- Author
- Liu D
- Publication year
External Links
Snippet
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date …
- 101700072511 PXA1 0 title abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1632—External expansion units, e.g. docking stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/16—Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/30—Arrangements for managing names, e.g. use of aliases or nicknames
- H04L61/306—Name types
- H04L61/3065—Application layer names, e.g. buddy name, unstructured name chosen by a user or home appliance name
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barrett et al. | SSH, The Secure Shell: The Definitive Guide: The Definitive Guide | |
Kaeo | Designing network security | |
Canavan | Fundamentals of network security | |
Strand | Adaptive distributed firewall using intrusion detection | |
Santos et al. | CCNA Security 210-260 Official Cert Guide: CCNA Sec 210-260 OCG | |
Oriyano | Penetration testing essentials | |
Oriyano | Hacker techniques, tools, and incident handling | |
Khan | Securing network infrastructure with cyber security | |
Liu | Next generation SSH2 implementation: securing data in motion | |
De Laet et al. | Network security fundamentals | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Joshi | Network security: know it all | |
Atighetchi et al. | Safe configuration of TLS connections | |
Bock | Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data | |
Dubrawsky | How to cheat at securing your network | |
McMillan | CCNA security study guide: exam 210-260 | |
Keswani et al. | History and generations of security protocols | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Li et al. | Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges | |
Regis Jr | Securing VoIP: keeping your VoIP network safe | |
Tolboom | Computer Systems Security | |
Bameyi et al. | End-to-end security in communication networks: a review | |
Barrett et al. | CompTIA Security+ SY0-401 Exam Cram | |
Singh | Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents | |
Ganguly | Network and application security: fundamentals and practices |