Images L

L2F (Layer 2 Forwarding) protocol, 357

L2TP (Layer 2 Tunneling Protocol), 358–359

Labels

data classification and handling, 50

data sensitivity, 813–814

identifying evidence, 775

U.S. government information classification, 330

Languages

failures in software code, 631–632

filtering with antispam products, 484

making security measurable, 760–761

LANs (local area networks), defined, 235

Laptops

attacking network remotely using, 206

physical precautions against theft of, 222–223

securing when not in use, 219

securing with cable locks, 213

training for indicators of network attacks, 210

virtual desktop infrastructure (VDI) and, 418

Last mile problem, ...

Get Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.