From 6a5e3e1bb06e0dfcc82a470423742ff53b7cbbab Mon Sep 17 00:00:00 2001 From: Italo Maia Date: Tue, 10 Oct 2017 22:29:04 -0300 Subject: [PATCH] Adding Usability section Quite important for security as most attacks exploit usability problems. --- README.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 3f1afcc..22bcc71 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,8 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c - [Web Application Firewall](#web-application-firewall) - [Scanning / Pentesting](#scanning--pentesting-1) - [Runtime Application Self-Protection](#runtime-application-self-protection) - - [Development](#development) + - [Development](#development) + - [Usability](#Usability) - [Big Data](#big-data) - [Datastores](#datastores) - [DevOps](#devops) @@ -244,6 +245,11 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c - [Secure by Design](https://www.manning.com/books/secure-by-design?a_aid=danbjson&a_bid=0b3fac80) - Book that identifies design patterns and coding styles that make lots of security vulnerabilities less likely. (early access, published continuously, final release fall 2017) +## Usability + +- [Usable Security Course](https://pt.coursera.org/learn/usable-security) - Usable Security course at coursera. Quite good for those looking for how security and usability intersects. + + ## Big Data - [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.