O'Reilly logo

CISSP Study Guide, 3rd Edition by Joshua Feldman, Seth Misenar, Eric Conrad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

J
Java, 141–142, 431
JavaScript Object Notation, See JSON
Jefferson Disks, 153–154
Job rotation, 350–351
Joint Photographic Experts Group, See JPEG
JPEG (Joint Photographic Experts Group), 224
JSON (JavaScript Object Notation), 142
K
KDC (Key Distribution Center), KERBEROS, 315–318
KERBEROS, 314–318
Keyboard dynamics, 308
Key clustering, 176
Key Distribution Center, See KDC
Keying options, triple DES, 164–165
Key locks, 187–190
Key terms, cryptography, 146
KLOC, 462–463
Knowledge bases, expert systems, 469–470
Known key attacks, 174
Known plaintext attacks, 173
L
L2F (Layer 2 Forwarding), 281
L2TP (Layer 2 Tunneling Protocol), 281
Labels, object security, 82
Ladder of discipline, 53
LANs (Local Area Networks)
ARCNET ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required