| < Day Day Up > |
|
Hackers and hacking, 18, 310, 319
Handshaking, 36
Hardening
applications, 155
CIA Triad and applications, 262–263
e-mail servers, 258, 291
servers, 257–263, 291
Windows operating systems, 347–348
Hardware. See Devices
Hash algorithms and hashes, 18, 150, 163–165, 182, 184
message digests, 151, 187
one-way hashes, 38
HDLC (High Level Data Link Control), 115–116
Hiding, data or information, 287
HIDS (host-based IDS), 120
High Level Data Link Control (HDLC), 115–116
Hijacks, 38–39
cookie hijacks, 71
Hiring and security, 214
Hoaxes, 63–64
Honey pots, 121–122, 144
Host-based IDS (HIDS), 120
Hot-fixes, 256, 295
HTTP, 129
HTTPS (HyperText Transport Protocol Secure), 65–66, 83
Hubs, 132
Human behavior and human errors, 62
Human Resources and security, 214, 226, 235
HyperText Transport Protocol Secure (HTTPS), 65–66, 83
| < Day Day Up > |
|