|
|
hackers, 479-481
half scans, 535
hardware-based tokens, 6
hardware segmentation, 139
hash values, 337
hashing, 337
NT password hashes, cracking (exercise), 339-341
hashing algorithm functions, 337-339
heap overflows, 523
hexadecimal numbering, 417
high security mode, 140
hiring processes, 144
host-based IDSs, 136, 213, 451
hosting service providers (HSPs), 188
hot sites, 279
HSPs (hosting service providers), 188
HTTP over SSL protocol (HTTP/S protocol), 431
hubs, 400, 437
hybrid keys, 353
|
|