Hackers, motives of, 352
Hacks (security breaches), 303, 352
Handheld devices, web site accessibility for, 116
Handling an exception, explained, 299
Hard drive arrays, 272
Hardware
consolidating or removing outdated, 445
scaling up, 152-153
too much variety in current, 57
Hardware requirements, existing and future, 124
Hardware resources, increasing, 152-153
Hardware/software configurations, tracking, 363
Hash, 186
Hashing, 186
Hashing algorithm, 186
Help authoring tool, 392
Help desk, 194
Help files, creating external, 392
Help project files, creating, 392
HelpProvider component, 392
HelpProvider component key properties and methods, 392
HGL (Happy Go Lucky Employment Agency). See Employment agency case study
Hidden users, 95
Hierarchical databases, 169
High availability, 155
High priority business processes, 95
High value business processes, 95
High-availability systems and applications, 156, 348-349
developer maintenance of, 367
OLTP for, 266
High-level analysis of business and solution, 393
High-level requirements, 99, 150
High-reliability application, creating, 159
History of data changes, 339
Horizontal partitions, splitting data into, 370
How or how well requirements, 100
HTML application, 13
HTML documentation, 392
HTML Help Workshop (Hhw.exe), 392
HTML (Hypertext Markup Language), 273
tools for editing, 23
vs. XML, 274
HTML pages, download speed of, 85
HTTP address, resolved to UNC share, 433
HTTP (Hypertext Transfer Protocol), 8
authentication schemes, 303
web services and, 272
Human element of security, 353
Human factors, in user interface design, 265
Hypertext links, accessible, 115