H
Hamiltonian path problem, 89 “90
Handshake Protocol
secure sockets layer, 161 “67, 179 “80
transport layer security, 171 “73, 179 “80
Hash function, 90 “92
one-way, 35, 36, 40, 91 “92, 106 “7, 134, 170, 174 “75, 262
Header
Hypertext Transfer Protocol, 24 “25
Internet Protocol, 132 “33
packet-filtering rules, 55 “56
Helper application, 273 “75
Hidden uniform resource locator, 26, 27
Hierarchical trust model, 192
HMAC construction, 134 “35, 160 “61, 171
Hostname access restriction, 27 “28
Host-oriented keying, 130 “31
Host security, 13, 50, 52 “53
Htpasswd utility, 42, 44 “45
HTTPS Protocol, 171, 175, 179, 181, 227, 298
Hybrid cryptography scheme, 103 “5
Hypertext markup language, 6
Hypertext markup language tag filtering, 292
Hypertext proprocessor, 307
Hypertext Transfer Protocol, 5 “6, 21 “26, 166, 179, 298 “99, 303 “4, 325, 335, 387
Hypertext Transfer Protocol proxy server, 329 “30
Hypertext Transfer Protocol state management, 325, 327, 328