only for RuBoard - do not distribute or recompile |
Web Security, Privacy & Commerce, 2nd Edition
[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]
L
See : PICS labels, PICSLaDue, Mark
LANs (local area networks) , 2nd
firewalls, protection with
laptops, prevention of theft
laptop locks
Law Enforcement Access Field (LEAF)
laws and legal issues
backups
laws and legal issues
after break-in
circumstances requiring legal action
compromised networks, hazards of ownership
criminal complaints, filing
criminal prosecution, risks of pursuing
identification
intellectual property
jurisdiction
law enforcement
liability for defective software
libel
precautions
LDAP
LEAF (Law Enforcement Access Field)
Lenstra, Arjen
level-zero backup
Leyland, Paul
liability
libel
lightning , 2nd
Limit command
directive
See : access control limiting accesslinks
Linux
SSL-enabled web servers, and
See : JavaScript LiveScriptloadable modules
See : credit cards loans, creditlocal HTTP proxy
local intranet zone
local storage
location-based identification
lock programs
lock-down
locks
log files
log in
log servers
logging , 2nd , 3rd
browser
criminal investigations, and
exclusion of sensitive information
software installations
Swatch program
Unix systems, facilities for
Windows 2000
logins and security
logins, limiting
logout
Love Bug , 2nd
only for RuBoard - do not distribute or recompile |