layers, encryption, 167–169
least privilege principle
ensuring for databases, 270–272
overview, 247–248
restricting database users, 289–290
.licx files, 63
list of techniques, 218–219
locking accounts against brute-force attacks, 79–81
logging errors, 324–325
login forms
building, 55–58
protecting, 55–57
lost passwords, resetting, 28–42