Penetration Testing mailing list archives

Attack Simulation and Threat Modeling book


From: fx0ne <seyi.akin () gmail com>
Date: Wed, 10 Feb 2010 16:07:50 -0800 (PST)


Attack Simulation and Threat Modeling is a book that explores the abundant
resources available in advanced security data collection, classification,
processing and mining. It attempts to give insight into a number of
alternative methods of security and attack analytics that leverage
methodologies adopted from various other disciplines in extracting valuable
data to support security research work and chart a course for enterprise
security decision making. 

Synopsis

Threat Vectors and Attack Signatures
Attack Virtualization and Behavioural analysis
Security Event Correlation and Pattern Recognition
Exploratory Security Analytics and Threat Hypothesis
Machine Learning Algorithms

It is released under the GNU FDL v1.3 License and can be downloaded here:
http://inverse.com.ng/book2/Attack_Simulation_and_Threat_Modeling.pdf

Cheers!

Olu
-- 
View this message in context: http://old.nabble.com/Attack-Simulation-and-Threat-Modeling-book-tp27540377p27540377.html
Sent from the Penetration Testing mailing list archive at Nabble.com.


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: