mirror of
https://github.com/sbilly/awesome-security.git
synced 2024-10-01 01:06:21 -04:00
Adding Usability section
Quite important for security as most attacks exploit usability problems.
This commit is contained in:
parent
5088425d6c
commit
6a5e3e1bb0
@ -36,6 +36,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
|
||||
- [Scanning / Pentesting](#scanning--pentesting-1)
|
||||
- [Runtime Application Self-Protection](#runtime-application-self-protection)
|
||||
- [Development](#development)
|
||||
- [Usability](#Usability)
|
||||
- [Big Data](#big-data)
|
||||
- [Datastores](#datastores)
|
||||
- [DevOps](#devops)
|
||||
@ -244,6 +245,11 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
|
||||
- [Secure by Design](https://www.manning.com/books/secure-by-design?a_aid=danbjson&a_bid=0b3fac80) - Book that identifies design patterns and coding styles that make lots of security vulnerabilities less likely. (early access, published continuously, final release fall 2017)
|
||||
|
||||
|
||||
## Usability
|
||||
|
||||
- [Usable Security Course](https://pt.coursera.org/learn/usable-security) - Usable Security course at coursera. Quite good for those looking for how security and usability intersects.
|
||||
|
||||
|
||||
## Big Data
|
||||
|
||||
- [data_hacking](https://github.com/ClickSecurity/data_hacking) - Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data.
|
||||
|
Loading…
Reference in New Issue
Block a user