Lattice Techniques - Lattice Techniques use security designations to determine access to information.
Legion - Software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate Intranet.
Link State - With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.
Logic bomb - A piece of code inserted into a software system that will set off a malicious function when specified conditions are met.
Logic Gate - A logic gate is an elementary building block of a digital circuit. Most logic gates have two inputs and one output. As digital circuits can only understand binary, inputs and outputs can assume only one of two states, 0 or 1.