J

JAD (joint analysis development), 968

Java applets, 1013–1016

Javascript commands, 263–264

JDBC (Java Database Connectivity), 936

job rotation, management of, 1052

John the Ripper password-cracking tool, 1108

Juggernaut, 1107

jurisdictions, 882, 901

JVM (Java Virtual Machine), 1013–1014

K

KDC (Key Distribution Center), Kerberos, 201–204, 741

KDD (knowledge discovery in database), 950

KDFs (Key Derivation Functions), 686

Kerberos, 200–205, 741

Kerckhoff’s principle, 56–57, 672–674

kernel

evolution of operating system terminology, 316–317

rootkits, 650

security, 330–331

vulnerability testing for flaws in, 1118

kernel mode, CPU in, 287

kernel proxy firewalls, 563

key clustering, 676

Key Derivation Functions (KDFs), 686

Key Distribution Center ...

Get CISSP All-in-One Exam Guide, Fifth Edition, 5th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.