Reid, 2003 - Google Patents
Secure Shell in the EnterpriseReid, 2003
View PDF- Document ID
- 10107919708573057967
- Author
- Reid J
- Publication year
External Links
Snippet
Secure Shell in the Enterprise Page 1 Sun Microsystems, Inc. 4150 Network Circle Santa
Clara, CA 95054 USA 650-960-1300 Send comments about this document to: docfeedback@sun.com
Secure Shell in the Enterprise Jason Reid Part No. 817-1024-10 June 2003, Revision 14 …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45508—Runtime interpretation or emulation, e g. emulator loops, bytecode interpretation
- G06F9/45512—Command shells
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250225246A1 (en) | Secure browser synchronization across browser instances | |
| Lampson | Computer security in the real world | |
| Pearson et al. | Trusted computing platforms: TCPA technology in context | |
| US7478420B2 (en) | Administration of protection of data accessible by a mobile device | |
| Souppaya et al. | Guide to enterprise telework, remote access, and bring your own device (BYOD) security | |
| Ristic | Apache security | |
| Talukder et al. | Architecting secure software systems | |
| Bauer | Building secure servers with Linux | |
| Shimonski et al. | Security Strategies in Windows Platforms and Applications | |
| Tracy et al. | Guidelines on Securing Public Web Servers Web Servers | |
| Blair | Aligning Security Operations with the MITRE ATT&CK Framework | |
| Dubrawsky | How to cheat at securing your network | |
| Bauer | Linux server security | |
| Fenzi et al. | Linux security HOWTO | |
| Hood et al. | IT Security Plan for Flight Simulation Program | |
| Scarfone et al. | Guide to enterprise telework and remote access security | |
| Stanger et al. | Hack proofing Linux: a guide to open source security | |
| Reid | Secure Shell in the Enterprise | |
| Beuchelt | UNIX and Linux security | |
| US12445493B2 (en) | Monitoring cloud computing resources | |
| Henttunen | Automated hardening and testing CentOS linux 7: security profiling with the USGCB baseline | |
| Wyatt et al. | Secure Messaging Scenarios with WebSphere MQ | |
| Souppaya et al. | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist | |
| Walsh et al. | Identity Security for Software Development: Best Practices That Every Developer Must Know | |
| Badger et al. | Guide to Securing Apple OS X 10.10 Systems for IT Professionals |