Practical Guide to Software Quality Management (Artech House Computing Library)

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] HA (high availability)

hackers     Apache web server and     honeypots and     rootkits

     web server attacks and halt -d commandhashing     MD5 algorithm     msyslog and 2nd     security considerations     SHA-1 algorithm

     TLS ciphers

     TSIGs andheaders     envelope versus 2nd

     information leaks

     pflogd and

     trivially faking

HELO request (SMTP) 2nd 3rdHIDS (host-based IDS)

     checksums     installing

     overview 2nd HiFn chipsets high availability (HA) hmac-md5 hashing algorithm HOME_NET variable (snort.conf)

Honeynet Project

honeypots 2nd

host-based firewalls 2nd

hostname

     CARP interfaces and

     CNAME instead of

     HELO request

     httpd and

     internal mail servers

     launching jail 2nd

     matching

     plus sign and

hosts.allow file 2nd

hosts.deny file Hot Standby Router Protocol (HSRP) 2nd

Hot-Cold firewall architecture

Hot-Hot firewall architecture

Hot-Standby firewall architecture 2nd 3rd

Hot-Warm firewall architecture 2nd HSRP (Hot Standby Router Protocol) 2nd .htaccess files 2nd

HTML     Apache and     entity encoding 2nd     injection

     mod_include and 2nd     separating locationsHTTP     ACID and     DAV standard and     information leaks     Snort and

     SSL and

     URL encoding 2ndhttpd     chroot environment and

     MaxClients

     process size

     root access and

     two-tiered architecturehttpd.conf file

     CGI module (Apache)     jails and

     launching     MaxClients directive     mod_include and     modules and     PHP and

     protecting

     SSL and

     SSLCipherSuite directive

     system immutable flag

     user overrides

httpd.core file

HTTPS 2nd 3rd

human interface layer (TSK)

 < Day Day Up >   

Категории