Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Hackers [See also Attackers; Crackers.]

     overview

     sting operation

     versus crackers

Hacking

    ethical [See Penetration testing.]

     ethical issues

Hactivism, attack motive

Halting problem 2nd

Hard knapsacks

Hardware [See also Cables ; Networks.]

     controls

     legal issues

     viruses

Hardware-enforced protection

Hash codes [See also Hash function.]

Hash function

Hazard analysis 2nd [See also Physical security.]

HAZOP (hazard and operability studies) 2nd

Herald, New Zealand

Heroes, organizational

Heuristic intrusion detection 2nd

Hierarchical security policies

Hierarchical structuring

Hierarchies of complexity

High-confidence software

Highjackers

HIPAA (Health Insurance Portability and Accountability Act) 2nd

Hollywood e-mail theft

Honeypots

Hoo, Soo

Host-based intrusion detection

Hostile applets 2nd

Hosts

Hot site backups

HRU (HarrisonRuzzoUllman) security model

Huffman codes

Human fallibility case study

Hyppönen, Mikko

Категории