diff --git a/README.md b/README.md index 60cd984..bf9f0bd 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,8 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c - [Web Application Firewall](#web-application-firewall) - [Scanning / Pentesting](#scanning--pentesting-1) - [Runtime Application Self-Protection](#runtime-application-self-protection) - - [Development](#development) + - [Development](#development) + - [Usability](#Usability) - [Big Data](#big-data) - [Datastores](#datastores) - [DevOps](#devops) @@ -247,6 +248,11 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c - [OAuth 2 in Action](https://www.manning.com/books/oauth-2-in-action) - Book that teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. +## Usability + +- [Usable Security Course](https://pt.coursera.org/learn/usable-security) - Usable Security course at coursera. Quite good for those looking for how security and usability intersects. + + ## Big Data - [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.