James Michael Stewart

James Michael Stewart’s Followers (4)

member photo
member photo
member photo
member photo

James Michael Stewart


Genre


Average rating: 4.16 · 1,230 ratings · 88 reviews · 85 distinct worksSimilar authors
CISSP (ISC)2 Certified Info...

by
4.27 avg rating — 310 ratings — published 2015 — 6 editions
Rate this book
Clear rating
CISSP Certified Information...

4.13 avg rating — 192 ratings — published 2003 — 31 editions
Rate this book
Clear rating
CISSP (ISC)2 Certified Info...

by
4.07 avg rating — 30 ratings
Rate this book
Clear rating
Network Security, Firewalls...

3.70 avg rating — 27 ratings — published 2010 — 8 editions
Rate this book
Clear rating
CompTIA Security+ Review Gu...

3.71 avg rating — 14 ratings — published 2011 — 6 editions
Rate this book
Clear rating
CompTIA Security+ Review Gu...

3.70 avg rating — 10 ratings3 editions
Rate this book
Clear rating
MCSE IIS 4 Exam Cram Adapti...

by
3.88 avg rating — 8 ratings — published 1999 — 2 editions
Rate this book
Clear rating
CompTIA Security+ Review Gu...

3.44 avg rating — 9 ratings — published 2008 — 3 editions
Rate this book
Clear rating
70-270: MCSE Guide to Micro...

3.38 avg rating — 8 ratings — published 2004 — 5 editions
Rate this book
Clear rating
CompTIA Security+ Review Gu...

4.20 avg rating — 5 ratings
Rate this book
Clear rating
More books by James Michael Stewart…
Quotes by James Michael Stewart  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“Oscar Newman’s book Creating Defensible Space,”
James Michael Stewart, CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide

“Senior management approval and buy-in is essential to the success of the overall BCP effort. If possible, you should attempt to have the plan endorsed by the top executive in your business—the chief executive officer, chairman, president, or similar business leader. This move demonstrates the importance of the plan to the entire organization and showcases the business leader’s commitment to business continuity. The signature of such an individual on the plan also gives it much greater weight and credibility in the eyes of other senior managers, who might otherwise brush it off as a necessary but trivial IT initiative.”
James M. Stewart, CISSP: Certified Information Systems Security Professional Study Guide

“This key is broken up in a series of operations into 52 16-bit subkeys.”
James M. Stewart, CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide



Is this you? Let us know. If not, help out and invite James to Goodreads.