Web Security, Privacy and Commerce, 2nd Edition
| only for RuBoard - do not distribute or recompile | |
Web Security, Privacy & Commerce, 2nd Edition
[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]L See : PICS labels, PICS
LaDue, Mark
LANs (local area networks) , 2nd firewalls, protection with
laptops, prevention of theft laptop locks
Law Enforcement Access Field (LEAF)
laws and legal issues backups
laws and legal issues after break-in
circumstances requiring legal action
compromised networks, hazards of ownership
criminal complaints, filing
criminal prosecution, risks of pursuing
identification
intellectual property
jurisdiction
law enforcement
liability for defective software
libel
precautions
LDAP
LEAF (Law Enforcement Access Field)
Lenstra, Arjen
level-zero backup
Leyland, Paul
liability
libel
lightning , 2nd
Limit command
directive
See : access control limiting access
links
Linux SSL-enabled web servers, and
See : JavaScript LiveScript
loadable modules
See : credit cards loans, credit
local HTTP proxy
local intranet zone
local storage
location-based identification
lock programs
lock-down
locks
log files
log in
log servers
logging , 2nd , 3rd browser
criminal investigations, and
exclusion of sensitive information
software installations
Swatch program
Unix systems, facilities for
Windows 2000
logins and security
logins, limiting
logout
Love Bug , 2nd
| only for RuBoard - do not distribute or recompile | |