Index_H


H

Hamiltonian path problem, 89 “90
Handheld device, 7
Handshake Protocol
secure sockets layer, 161 “67, 179 “80
transport layer security, 171 “73, 179 “80
Hash function, 90 “92
one-way, 35, 36, 40, 91 “92, 106 “7, 134, 170, 174 “75, 262
Header
Hypertext Transfer Protocol, 24 “25
Internet Protocol, 132 “33
packet-filtering rules, 55 “56
Helper application, 273 “75
Hidden uniform resource locator, 26, 27
Hierarchical trust model, 192
HMAC construction, 134 “35, 160 “61, 171
Host-based scanner, 380
Host header, 24
Hostname access restriction, 27 “28
Host-oriented keying, 130 “31
Host security, 13, 50, 52 “53
Htpasswd utility, 42, 44 “45
HTTPS Protocol, 171, 175, 179, 181, 227, 298
Hybrid cryptography scheme, 103 “5
Hypertext markup language, 6
Hypertext markup language tag filtering, 292
Hypertext proprocessor, 307
Hypertext Transfer Protocol, 5 “6, 21 “26, 166, 179, 298 “99, 303 “4, 325, 335, 387
Hypertext Transfer Protocol proxy server, 329 “30
Hypertext Transfer Protocol state management, 325, 327, 328



Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net