tag:blogger.com,1999:blog-4088979.post115301780633346327..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Three Pre-ReviewsRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-1153225178037070202006-07-18T08:19:00.000-04:002006-07-18T08:19:00.000-04:00Hi Chris,Any chance you will post something about ...Hi Chris,<BR/><BR/>Any chance you will post something about your CISSP experience? Thank you.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1153199402491967662006-07-18T01:10:00.000-04:002006-07-18T01:10:00.000-04:00I'm less than 48 hours out of my CISSP exam and so...I'm less than 48 hours out of my CISSP exam and somehow I'm not surprised that a turkey is working on the ISC(2) CBK. Then again I know the CISSP doesnt hold a really good rep around these parts.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1153061987179159092006-07-16T10:59:00.000-04:002006-07-16T10:59:00.000-04:00Software Forensics! I've bought that book when it...Software Forensics! I've bought that book when it first came out, and have since donated it to the library. I can honestly say that it was by far the worst book I have ever read, and I read quite a bit. It was 215 pages, with the last 50+ pages being nothing but advertisements for other books. I'm not sure what his target audience was either because he had a chapter or two on detecting plagiarism in research papers. It was the first book I ever read where I didn't learn anything. The negative reviews on Amazon are accurate. It was a complete waste of money.Anonymousnoreply@blogger.com