Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Hackers [See also Attackers; Crackers.] overview sting operation versus crackers Hacking ethical [See Penetration testing.] ethical issues Hactivism, attack motive Halting problem 2nd Hard knapsacks Hardware [See also Cables ; Networks.] controls legal issues viruses Hardware-enforced protection Hash codes [See also Hash function.] Hash function Hazard analysis 2nd [See also Physical security.] HAZOP (hazard and operability studies) 2nd Herald, New Zealand Heroes, organizational Heuristic intrusion detection 2nd Hierarchical security policies Hierarchical structuring Hierarchies of complexity High-confidence software Highjackers HIPAA (Health Insurance Portability and Accountability Act) 2nd Hollywood e-mail theft Honeypots Hoo, Soo Host-based intrusion detection Hostile applets 2nd Hosts Hot site backups HRU (HarrisonRuzzoUllman) security model Huffman codes Human fallibility case study Hyppönen, Mikko |