I



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Hackers [See also Attackers; Crackers.]
     overview
     sting operation
     versus crackers
Hacking
    ethical [See Penetration testing.]
     ethical issues
Hactivism, attack motive
Halting problem 2nd
Hard knapsacks
Hardware [See also Cables ; Networks.]
     controls
     legal issues
     viruses
Hardware-enforced protection
Hash codes [See also Hash function.]
Hash function
Hazard analysis 2nd [See also Physical security.]
HAZOP (hazard and operability studies) 2nd
Herald, New Zealand
Heroes, organizational
Heuristic intrusion detection 2nd
Hierarchical security policies
Hierarchical structuring
Hierarchies of complexity
High-confidence software
Highjackers
HIPAA (Health Insurance Portability and Accountability Act) 2nd
Hollywood e-mail theft
Honeypots
Hoo, Soo
Host-based intrusion detection
Hostile applets 2nd
Hosts
Hot site backups
HRU (HarrisonRuzzoUllman) security model
Huffman codes
Human fallibility case study
Hyppönen, Mikko




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net