[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]
hacker challenges
The Hacker Crackdown: Law and Disorder on the Electronic Frontier (Sterling, Bruce)
hackers
2nd
[See also intruders] as security consultants
Hackers: Heroes of the Computer Revolution (Levy, Steven)
Hafner, Katie (Cyberpunk: Outlaws and Hackers on the Computer Frontier)
Haley, Chuck
Halon gas
halt command
handheld computers
Harbison, Samuel P. (C, a Reference Manual)
hard disks
[See disk drives] hard links
[See links] hardcopy device
[See printers] hardcopy of log files
2nd
3rd
[See also media, printed] hardware
[See also devices; disk drives; laptops] auditing user access to
backing up
[See backups] bugs in
cables, cutting as destructive attack
environmental dangers affecting
failure of
importance of protecting
local storage of secondary equipment
locking
logging information about
modems
physical access to
2nd
placement of
power loss, as destructive attack
read-only protection
tagging
tape drives
2nd
3rd
temperature effects on
terminals secure
2nd
unattended
2nd
theft of
2nd
3rd
trusting
2nd
unplugging to get rid of intruder
hardware tokens
hash functions
[See message digest functions] hash mark (#) disabling services with
Unix superuser prompt
Hash Message Authentication Code (HMAC)
Hawking, Stephen W. (A Brief History of Time: From the Big Bang to Black Holes)
header, packet
Hein, Trent R. (UNIX System Administration Handbook)
Hellman, Martin E.
"Hiding Information and Signatures in Trap Door Knapsacks"
"New Directions in Cryptography"
"On the Security of Multiple Encryption"
HELO command, SMTP
HELP command, SMTP
2nd
HF200 gas
HFS filesystem
HFS+ filesystem
hidden files created by intruders
listing
hidden space
High Technology Crimes Investigation Association (HTCIA)
hijacking Telnet sessions
Hinsley, F. H. (Code Breakers: The Inside Story of Bletchley Park)
historical accounts
history files
hit lists of passwords
HMAC (Hash Message Authentication Code)
Hoffman, Lance J. Building in Big Brother: The Cryptographic Policy Debate
Rogue Programs: Viruses, Worms and Trojan Horses
holes, security
[See security holes] home directories
2nd
HOME variable, attacks through
The Honeynet Project
honeypots
host authentication, SSH
host command
host-based firewall program
2nd
host-based IDS
hostnames
controlling access to
determining from IP addresses
name service and
underscore character in
hosts
monitoring with netstat
NIS passwords for
trusted
hosts file
2nd
Hosts table (NIS+)
hosts.allow file
2nd
3rd
hosts.deny file
2nd
3rd
hosts.equiv file
2nd
3rd
hosts.lpd file
Hoyt, D. B. (Computer Security Handbook)
HTCIA (High Technology Crimes Investigation Association)
HTTP (Hypertext Transfer Protocol)
2nd
3rd
http group
http user
HTTPS (secure HTTP)
2nd
humidity
Hunt, A. E. (Computer Security Handbook)
Hunt, Craig (TCP/IP Network Administration)
hybrid public/private cryptosystems
Hypertext Transfer Protocol
[See HTTP]
|