SSH, The Secure Shell: The Definitive Guide
||Author: Daniel J. Barrett, Richard Silverman|
List Price: $39.95
Our Price: Click to see the latest and low price
Publisher: O'Reilly & Associates (15 February, 2001)
Sales Rank: 14,509
Average Customer Rating: 4.22 out of 5
Customer ReviewsRating: 4 out of 5
A great book overall, a few flaws
SSH, the Secure Shell: The Defintiive Guide is another great book from O'Reilly. As the name would suggest, however, it's not so much a meant as a tutorial or a howto as it is an in-depth analysis of SSH's workings, though the examples given could probably be used as the former.
The first chapters of the book begin with a lookat what SSH is, a summary of its general uses, and the differences between the various SSH implmentations. It then quickly moves onto a number of practical examples, with explanations of both the 'how' and 'why' behind the examples.
Some of the more interesting examples are those that demonstrate X11 tunnelling, key management, and how SSH can be integrated with other applications (such as PGP, for example).
One of the major faults of the book is in the writing style. The regular switching back and forth between a conversational tone and a serious, technical one was something that I found rather annoying. But other than that, this is more or less a well-rounded and nicely written book on SSH, and I would certainly recommend it to anyone who is interested in this topic.
Rating: 2 out of 5
Good Content, Very Poor Organization
I had some experience with ssh prior to purchasing this book, but picked it up to learn about more advanced topics like key pair generation for unattended ssh tunnels.
The content of the book is ok, but the organization is horrible. The authors mix SSH1, SSH2 and OpenSSH and it is easy to get confused as to which files or commands belong to which. To add to the confusion, OpenSSH now appears to support SSH2 protocol so a lot of the file names don't match up. That makes the book a little out-of-date.
The biggest complaint is that there are no "cookbooks". I wanted to do something well-defined and relatively common. There was a section suited specifically to what I wanted. However to ACTUALLY IMPLEMENT the technique, I had to flip back and forth between 5 different sections, plus infer some information about file contents.
There are few complete configuration file examples. There are snips of files scattered throughout a section - again making for a lot of navigation through the book to assemble sufficient information to get the job done.
The index is marginal, which makes this poorly-suited for a reference manual.
In all, a real disappointment for a O'Reilly book. The editors must have been asleep at the wheel.
Rating: 3 out of 5
Slowly getting it
Although not entirely difficult to follow, this book was useful after a little ssh hands-on.
· Network Security with OpenSSL
· Using Samba, Second Edition
· LDAP System Administration
· DNS and BIND, Fourth Edition
· sendmail, 3rd Edition