| | |
0.5. Which Chapters Are for You?
We propose several "tracks" for readers with different
interests and skills:
- System administrators
- Chapter 3, "Inside SSH"-Chapter 5, "Serverwide Configuration"
and Chapter 10, "A Recommended Setup" are the most important for
understanding SSH and how to build and configure servers. However, as
the administrator of a security product, you should read the whole
book.
- Unix users (not system administrators)
- Chapter 1, "Introduction to SSH"-Chapter 2, "Basic Client Use"
provide an overview, and Chapter 6, "Key Management and Agents" through Chapter 9, "Port Forwarding and X Forwarding" discuss SSH clients in depth.
- Windows end users
- Read Chapter 1, "Introduction to SSH", Chapter 2, "Basic Client Use", and Chapter 13, "Overview of Other Implementations" through Chapter 16, "F-Secure SSH Client (Windows, Macintosh)", for starters, and then others as your
interests guide you.
- Macintosh end users
- Read Chapter 1, "Introduction to SSH", Chapter 2, "Basic Client Use", Chapter 13, "Overview of Other Implementations", Chapter 16, "F-Secure SSH Client (Windows, Macintosh)", and Chapter 17, "NiftyTelnet SSH (Macintosh)", for
starters, and then others as your interests guide you.
- Users of other computer platforms
- Read Chapter 1, "Introduction to SSH", Chapter 2, "Basic Client Use", and Chapter 13, "Overview of Other Implementations", for
starters, and then others as your interests guide you.
Even if you are experienced with SSH, you will likely find value in
Chapter 3, "Inside SSH"- Chapter 12, "Troubleshooting and FAQ".
We cover significant details the Unix manpages leave unclear or
unmentioned, including major concepts, compile-time flags, server
configuration, and forwarding.
| | | 0.4. Our Approach | | 0.6. Supported Platforms |
|
|