O'Reilly logo

Next Generation SSH2 Implementation by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Solutions in this chapter:

  • 50,000 Foot View of the OSI Model
  • Using the OSI Model to Troubleshoot
  • Applying the OSI Model to Forensics
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

As the title states, this is the OSI model chapter. If you've been in the technical field and read any technical books, you've probably noticed this topic is in many of them. Let me stop you now before you skip over this chapter. This chapter will be different from the typical certification/technical books that are out there. I'll be honest; I personally hate reading the OSI model chapters in the books I have read. It's the first chapter that I want to skip over, so I'm designing this chapter to show you there is an interesting side ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required