Penetration Testing mailing list archives

Re: Attack Simulation and Threat Modeling book


From: Sebastian Schlag <schlag.sebastian () googlemail com>
Date: Wed, 24 Feb 2010 22:06:42 +0100

Hi there,

could someone, who was lucky enough to catch a copy of the ebook, please forward me a copy too?
Thanks in advance!

Best Regards,
Sebastian


Am 23.02.2010 um 17:20 schrieb Natalia Inoue:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi -- did anyone actually download this? The link appears to be
temporarily out of commission, so I was wondering if someone could
forward me a copy...


Best,
Nat.

On Wed, 10 Feb 2010 19:07:50 -0500 fx0ne <seyi.akin () gmail com>
wrote:
Attack Simulation and Threat Modeling is a book that explores the
abundant
resources available in advanced security data collection,
classification,
processing and mining. It attempts to give insight into a number
of
alternative methods of security and attack analytics that leverage
methodologies adopted from various other disciplines in extracting
valuable
data to support security research work and chart a course for
enterprise
security decision making.

Synopsis

Threat Vectors and Attack Signatures
Attack Virtualization and Behavioural analysis
Security Event Correlation and Pattern Recognition
Exploratory Security Analytics and Threat Hypothesis
Machine Learning Algorithms

It is released under the GNU FDL v1.3 License and can be
downloaded here:
http://inverse.com.ng/book2/Attack_Simulation_and_Threat_Modeling.p
df

Cheers!

Olu
--
View this message in context: http://old.nabble.com/Attack-
Simulation-and-Threat-Modeling-book-tp27540377p27540377.html
Sent from the Penetration Testing mailing list archive at
Nabble.com.


-------------------------------------------------------------------
-----
This list is sponsored by: Information Assurance Certification
Review Board

Prove to peers and potential employers without a doubt that you
can actually do a proper penetration test. IACRB CPT and CEPT
certs require a full practical examination in order to become
certified.

http://www.iacertification.org
-------------------------------------------------------------------
-----
-----BEGIN PGP SIGNATURE-----
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0

wpwEAQMCAAYFAkuEAGMACgkQeYNX6oZy8rYnJwP/fdUEbpXA5sZiOwCtkpre7MTSVkDJ
D7EUFfEd/LFAKLc6rTXhvfKHG27T/6COOozgsfG7hQ77/tkvYWH9glulCkSkU+if7z33
9Dx/D63Ga7HpA1MsowoExlARAj2a8Ya2vYO53mDOtZL2pxzTHTtpb/EayErW+NLXvzz8
h3TKA8Q=
=GqY/
-----END PGP SIGNATURE-----


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: