[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

hacker challenges 
The Hacker Crackdown: Law and Disorder on the Electronic Frontier (Sterling, Bruce) 
hackers  2nd  [See also intruders]
    as security consultants 
Hackers: Heroes of the Computer Revolution (Levy, Steven) 
Hafner, Katie (Cyberpunk: Outlaws and Hackers on the Computer Frontier) 
Haley, Chuck 
Halon gas 
halt command 
handheld computers 
Harbison, Samuel P. (C, a Reference Manual) 
hard disks  [See disk drives]
hard links  [See links]
hardcopy device  [See printers]
hardcopy of log files  2nd  3rd  [See also media, printed]
hardware  [See also devices; disk drives; laptops]
    auditing user access to 
    backing up  [See backups]
    bugs in 
    cables, cutting as destructive attack 
    environmental dangers affecting 
    failure of 
    importance of protecting 
    local storage of secondary equipment 
    locking 
    logging information about 
    modems 
    physical access to  2nd 
    placement of 
    power loss, as destructive attack 
    read-only protection 
    tagging 
    tape drives  2nd  3rd 
    temperature effects on 
    terminals
        secure  2nd 
        unattended  2nd 
    theft of  2nd  3rd 
    trusting  2nd 
    unplugging to get rid of intruder 
hardware tokens 
hash functions  [See message digest functions]
hash mark (#)
    disabling services with 
    Unix superuser prompt 
Hash Message Authentication Code (HMAC) 
Hawking, Stephen W. (A Brief History of Time: From the Big Bang to Black Holes) 
header, packet 
Hein, Trent R. (UNIX System Administration Handbook) 
Hellman, Martin E. 
    "Hiding Information and Signatures in Trap Door Knapsacks" 
    "New Directions in Cryptography" 
    "On the Security of Multiple Encryption" 
HELO command, SMTP 
HELP command, SMTP  2nd 
HF200 gas 
HFS filesystem 
HFS+ filesystem 
hidden files
    created by intruders 
    listing 
hidden space 
High Technology Crimes Investigation Association (HTCIA) 
hijacking Telnet sessions 
Hinsley, F. H. (Code Breakers: The Inside Story of Bletchley Park) 
historical accounts 
history files 
hit lists of passwords 
HMAC (Hash Message Authentication Code) 
Hoffman, Lance J.
    Building in Big Brother: The Cryptographic Policy Debate 
    Rogue Programs: Viruses, Worms and Trojan Horses 
holes, security  [See security holes]
home directories  2nd 
HOME variable, attacks through 
The Honeynet Project 
honeypots 
host authentication, SSH 
host command 
host-based firewall program  2nd 
host-based IDS 
hostnames 
    controlling access to 
    determining from IP addresses 
    name service and 
    underscore character in 
hosts 
    monitoring with netstat 
    NIS passwords for 
    trusted 
hosts file  2nd 
Hosts table (NIS+) 
hosts.allow file  2nd  3rd 
hosts.deny file  2nd  3rd 
hosts.equiv file  2nd  3rd 
hosts.lpd file 
Hoyt, D. B. (Computer Security Handbook) 
HTCIA (High Technology Crimes Investigation Association) 
HTTP (Hypertext Transfer Protocol)  2nd  3rd 
http group 
http user 
HTTPS (secure HTTP)  2nd 
humidity 
Hunt, A. E. (Computer Security Handbook) 
Hunt, Craig (TCP/IP Network Administration) 
hybrid public/private cryptosystems 
Hypertext Transfer Protocol  [See HTTP]