Index
L
layers, encryption, 167–169
least privilege principleensuring for databases, 270–272
overview, 247–248
restricting database users, 289–290
.licx files, 63
list of techniques, 218–219
locking accounts against brute-force attacks, 79–81
logging errors, 324–325
logic errors, 317, 318
login formsbuilding, 55–58
protecting, 55–57
lost passwords, resetting, 28–42