Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)

I l @ ve RuBoard

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

L.cmds.   [See See UUCP]

L.sys.   [See See UUCP]

labels  

law enforcement   2nd   3rd   4th  

LDAP (Lightweight Directory Access Protocol)   2nd  

least privileges   2nd   3rd   4th  

legal reporting  

LILO (Linux loader)  

links

       hard  

       symbolic  

log

       monitoring  

logic bomb  

logs   2nd  

       application  

       changing  

       inadequate  

       security  

       system  

lpd  

I l @ ve RuBoard

Категории