Security Technologies for the World Wide Web, Second Edition

H

Hamiltonian path problem, 89 “90

Handheld device, 7

Handshake Protocol

secure sockets layer, 161 “67, 179 “80

transport layer security, 171 “73, 179 “80

Hash function, 90 “92

one-way, 35, 36, 40, 91 “92, 106 “7, 134, 170, 174 “75, 262

Header

Hypertext Transfer Protocol, 24 “25

Internet Protocol, 132 “33

packet-filtering rules, 55 “56

Helper application, 273 “75

Hidden uniform resource locator, 26, 27

Hierarchical trust model, 192

HMAC construction, 134 “35, 160 “61, 171

Host-based scanner, 380

Host header, 24

Hostname access restriction, 27 “28

Host-oriented keying, 130 “31

Host security, 13, 50, 52 “53

Htpasswd utility, 42, 44 “45

HTTPS Protocol, 171, 175, 179, 181, 227, 298

Hybrid cryptography scheme, 103 “5

Hypertext markup language, 6

Hypertext markup language tag filtering, 292

Hypertext proprocessor, 307

Hypertext Transfer Protocol, 5 “6, 21 “26, 166, 179, 298 “99, 303 “4, 325, 335, 387

Hypertext Transfer Protocol proxy server, 329 “30

Hypertext Transfer Protocol state management, 325, 327, 328

Категории