mirror of
https://github.com/sbilly/awesome-security.git
synced 2025-02-01 00:54:57 -05:00
Merge pull request #80 from italomaia/patch-1
Adding Usability section, thx @italomaia
This commit is contained in:
commit
27ef5b28d6
@ -36,6 +36,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
|
||||
- [Scanning / Pentesting](#scanning--pentesting-1)
|
||||
- [Runtime Application Self-Protection](#runtime-application-self-protection)
|
||||
- [Development](#development)
|
||||
- [Usability](#Usability)
|
||||
- [Big Data](#big-data)
|
||||
- [Datastores](#datastores)
|
||||
- [DevOps](#devops)
|
||||
@ -247,6 +248,11 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
|
||||
- [OAuth 2 in Action](https://www.manning.com/books/oauth-2-in-action) - Book that teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server.
|
||||
|
||||
|
||||
## Usability
|
||||
|
||||
- [Usable Security Course](https://pt.coursera.org/learn/usable-security) - Usable Security course at coursera. Quite good for those looking for how security and usability intersects.
|
||||
|
||||
|
||||
## Big Data
|
||||
|
||||
- [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.
|
||||
|
Loading…
x
Reference in New Issue
Block a user