L - Definitions

Browse Definitions
Search Definitions
  • L

    lawful interception (LI)

    Lawful interception (LI) is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages.

  • LEAP (Lightweight Extensible Authentication Protocol)

    LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. LEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.

  • lifestyle polygraph

    A lifestyle polygraph is a lie-detector (polygraph) test that is administered as a requirement for employment in certain fields.

  • link encryption (link level or link layer encryption)

    Link encryption (sometimes called link level or link layer encryption) is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.

  • live capture

    Live capture is the act or method of gathering biometric data from an individual while the individual is physically present.

  • logic bomb (slag code)

    In a computer program, a logic bomb, also called slag code, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command.

  • logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.

  • LUHN formula (modulus 10)

    The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close