O'Reilly logo

CISSP® All-in-One Exam Guide by Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

J

JAD (joint analysis development), 968

Java applets, 1013–1016

Javascript commands, 263–264

JDBC (Java Database Connectivity), 936

job rotation, management of, 1052

John the Ripper password-cracking tool, 1108

Juggernaut, 1107

jurisdictions, 882, 901

JVM (Java Virtual Machine), 1013–1014

K

KDC (Key Distribution Center), Kerberos, 201–204, 741

KDD (knowledge discovery in database), 950

KDFs (Key Derivation Functions), 686

Kerberos, 200–205, 741

Kerckhoff’s principle, 56–57, 672–674

kernel

evolution of operating system terminology, 316–317

rootkits, 650

security, 330–331

vulnerability testing for flaws in, 1118

kernel mode, CPU in, 287

kernel proxy firewalls, 563

key clustering, 676

Key Derivation Functions (KDFs), 686

Key Distribution Center ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required