Acessoremoto
Cambridge, n. 3, p. 6-12, jan. 1998.
LUPTAK, M. Making VNC more secure using SSH. Virtual Network Computing,
1998. Disponível em: http://www.cl.cam.ac.uk/Research/DTG/attarchive/vnc/sshvnc.html. Acessado em: 06 out. 2006.
RICHARDSON, T The RFB Protocol. 3. ed. Cambridge, 2005, 43p.
SSH Home Page. Disponível em: http://www.ssh.fi/. Acessado em: 10 out. 2006.
Criando tuneis criptografados com SSH. Disponível em: http://www.dicasl.com.br/dicas-l/20061017.php. Acessado em: 10 out. 2006.
Getting started with SSH. Disponível em: http://kimmo.suominen.com/docs/ssh/.
Acessado em: 15 out. 2006.
Wikipédia. Disponível em: http://pt.wikipedia.org/wiki/SSH. Acessado em: 15 out.
2006.
O que é SSH. Disponível em: http://www.rnp.br/newsgen/9708/n3-3.html.
Acessado em: 22 out. 2006.
Ylonen, T., "SSH Protocol Architecture", Disponível em: http://draft-ietfarchitecture-15.txt, Acessado em: 30 out. 2006.
Ylonen, T., "SSH Connection Protocol", Disponível em: http://draft-ietf-connect-
18.txt, Acessado em: 30 out. 2006.
Ylonen, T., "SSH Transport Layer Protocol", Disponível em: http://draft-ietftransport-17.txt, Acessado em: 30 out. 2006
S. Bellovin and B. Moskowitz. Client Certi cate and Key Retrieval for IKE.
Internet Engineering Task Force, Internet Draft, 2000.
B. Patel, B. Aboba, S. Kelly, and V. Gupta. Dynamic Host Conguration
Protocol (DHCPv4) Conguration of IPSec Tunnel Mode. Internet Enginee- ring Task Force, RFC 3456, 2003.
W. Richard Stevens. TCP/IP Illustrated, volume 1. Addison-Wesley, Rea-ding, Massachusetts, 2 edition,