Penetration Testing mailing list archives
Re: Attack Simulation and Threat Modeling book
From: Sebastian Schlag <schlag.sebastian () googlemail com>
Date: Wed, 24 Feb 2010 22:06:42 +0100
Hi there, could someone, who was lucky enough to catch a copy of the ebook, please forward me a copy too? Thanks in advance! Best Regards, Sebastian Am 23.02.2010 um 17:20 schrieb Natalia Inoue:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi -- did anyone actually download this? The link appears to be temporarily out of commission, so I was wondering if someone could forward me a copy... Best, Nat. On Wed, 10 Feb 2010 19:07:50 -0500 fx0ne <seyi.akin () gmail com> wrote:Attack Simulation and Threat Modeling is a book that explores the abundant resources available in advanced security data collection, classification, processing and mining. It attempts to give insight into a number of alternative methods of security and attack analytics that leverage methodologies adopted from various other disciplines in extracting valuable data to support security research work and chart a course for enterprise security decision making. Synopsis Threat Vectors and Attack Signatures Attack Virtualization and Behavioural analysis Security Event Correlation and Pattern Recognition Exploratory Security Analytics and Threat Hypothesis Machine Learning Algorithms It is released under the GNU FDL v1.3 License and can be downloaded here: http://inverse.com.ng/book2/Attack_Simulation_and_Threat_Modeling.p df Cheers! Olu -- View this message in context: http://old.nabble.com/Attack- Simulation-and-Threat-Modeling-book-tp27540377p27540377.html Sent from the Penetration Testing mailing list archive at Nabble.com. ------------------------------------------------------------------- ----- This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------- ----------BEGIN PGP SIGNATURE----- Charset: UTF8 Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 3.0 wpwEAQMCAAYFAkuEAGMACgkQeYNX6oZy8rYnJwP/fdUEbpXA5sZiOwCtkpre7MTSVkDJ D7EUFfEd/LFAKLc6rTXhvfKHG27T/6COOozgsfG7hQ77/tkvYWH9glulCkSkU+if7z33 9Dx/D63Ga7HpA1MsowoExlARAj2a8Ya2vYO53mDOtZL2pxzTHTtpb/EayErW+NLXvzz8 h3TKA8Q= =GqY/ -----END PGP SIGNATURE----- ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Attack Simulation and Threat Modeling book fx0ne (Feb 15)
- <Possible follow-ups>
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 23)
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Message not available
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Re: Attack Simulation and Threat Modeling book Shawn Merdinger (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)