tag:blogger.com,1999:blog-4088979.post116113990500776375..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Bloom's Hierarchy for Digital Security LearningRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-1161213169897512442006-10-18T19:12:00.000-04:002006-10-18T19:12:00.000-04:00Extremely interesting indeed. Thanks a lot for sha...Extremely interesting indeed. Thanks a lot for sharing this with us. While this model might seem obvious, it's only after it's been put in front of one's eyes. I will do as Chris and keep it handy.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1161209500410326672006-10-18T18:11:00.000-04:002006-10-18T18:11:00.000-04:00I like this model very much. In my personal opinio...I like this model very much. In my personal opinion, as it relates to security and technical things, I think 'evaluation' might be a better fit after 'analysis' and before 'synthesis'. Ill keep this chart in mind next time I pick up a new technical book.Chris Rohlfhttps://www.blogger.com/profile/06213034368649454197noreply@blogger.com