Merge pull request #80 from italomaia/patch-1

Adding Usability section, thx @italomaia
This commit is contained in:
sbilly 2018-01-08 00:30:23 +08:00 committed by GitHub
commit 27ef5b28d6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -36,6 +36,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Scanning / Pentesting](#scanning--pentesting-1) - [Scanning / Pentesting](#scanning--pentesting-1)
- [Runtime Application Self-Protection](#runtime-application-self-protection) - [Runtime Application Self-Protection](#runtime-application-self-protection)
- [Development](#development) - [Development](#development)
- [Usability](#Usability)
- [Big Data](#big-data) - [Big Data](#big-data)
- [Datastores](#datastores) - [Datastores](#datastores)
- [DevOps](#devops) - [DevOps](#devops)
@ -247,6 +248,11 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [OAuth 2 in Action](https://www.manning.com/books/oauth-2-in-action) - Book that teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. - [OAuth 2 in Action](https://www.manning.com/books/oauth-2-in-action) - Book that teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server.
## Usability
- [Usable Security Course](https://pt.coursera.org/learn/usable-security) - Usable Security course at coursera. Quite good for those looking for how security and usability intersects.
## Big Data ## Big Data
- [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data. - [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.