L
L2F (Layer 2 Forwarding) protocol, 357
L2TP (Layer 2 Tunneling Protocol), 358–359
Labels
data classification and handling, 50
data sensitivity, 813–814
identifying evidence, 775
U.S. government information classification, 330
Languages
failures in software code, 631–632
filtering with antispam products, 484
making security measurable, 760–761
LANs (local area networks), defined, 235
Laptops
attacking network remotely using, 206
physical precautions against theft of, 222–223
securing when not in use, 219
securing with cable locks, 213
training for indicators of network attacks, 210
virtual desktop infrastructure (VDI) and, 418
Last mile problem, ...
Get Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.