Implementing SSH : strategies for optimizing the Secure Shell /
57
Hovedforfatter: | |
---|---|
Format: | |
Sprog: | eng |
Udgivet: |
Indianapolis, IN : Wiley,
2004
|
Fag: |
_version_ | 1826425395678806016 |
---|---|
author | 330629 Dwivedi, Himanshu |
author_facet | 330629 Dwivedi, Himanshu |
author_sort | 330629 Dwivedi, Himanshu |
collection | OCEAN |
description | 57 |
first_indexed | 2024-03-05T05:45:19Z |
format | |
id | KOHA-OAI-TEST:345256 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T05:45:19Z |
publishDate | 2004 |
publisher | Indianapolis, IN : Wiley, |
record_format | dspace |
spelling | KOHA-OAI-TEST:3452562020-12-19T17:11:44ZImplementing SSH : strategies for optimizing the Secure Shell / 330629 Dwivedi, Himanshu Indianapolis, IN : Wiley,2004eng575859PSZJBLComputer networksData encryption (Computer science)URN:ISBN:0471458805 (pbk.) |
spellingShingle | Computer networks Data encryption (Computer science) 330629 Dwivedi, Himanshu Implementing SSH : strategies for optimizing the Secure Shell / |
title | Implementing SSH : strategies for optimizing the Secure Shell / |
title_full | Implementing SSH : strategies for optimizing the Secure Shell / |
title_fullStr | Implementing SSH : strategies for optimizing the Secure Shell / |
title_full_unstemmed | Implementing SSH : strategies for optimizing the Secure Shell / |
title_short | Implementing SSH : strategies for optimizing the Secure Shell / |
title_sort | implementing ssh strategies for optimizing the secure shell |
topic | Computer networks Data encryption (Computer science) |
work_keys_str_mv | AT 330629dwivedihimanshu implementingsshstrategiesforoptimizingthesecureshell |