L
L2TP, See Layer 2 tunneling protocol (L2TP)
Labor disputes, 578–589
capture acquisition, 578–579
divorce, 578
email headers and time stamps, email receipts, and bounced messages, 586–588
experimental evidence, 585–586
file carving, 582–585
file system analyses, 579–580
forensic images using software and hardware write blockers, 579
live capture of relevant files, 579
NTFS, 580
password recovery, 582
patent infringement, 578
RAID, 579
steganography, 588–589
time stamps work, 585
LAN, See Local area network (LAN)
Land attack, 1074
Landsat-7, 1174
Lanman hashes (LM hashes), 590
Latent Semantic Indexing, 651b
Lattice-based cryptography, 1191
Layer 2 forwarding, 849
Layer 2 tunneling protocol ...
Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.