Penetration Testing mailing list archives
Re: Attack Simulation and Threat Modeling book
From: "Natalia Inoue" <natali () hushmail com>
Date: Wed, 24 Feb 2010 17:10:25 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FWIW, I've uploaded it here: http://www.filedropper.com/attacksimulationandthreatmodeling I believe someone on the list is also hosting it on their server, but I can't seem to find the relevant email in my inbox/archive. Anyway, hope that helps. Best, Nat. On Wed, 24 Feb 2010 16:06:42 -0500 Sebastian Schlag <schlag.sebastian () googlemail com> wrote:
Hi there, could someone, who was lucky enough to catch a copy of the ebook, please forward me a copy too? Thanks in advance! Best Regards, Sebastian Am 23.02.2010 um 17:20 schrieb Natalia Inoue:-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi -- did anyone actually download this? The link appears to be temporarily out of commission, so I was wondering if someonecouldforward me a copy... Best, Nat. On Wed, 10 Feb 2010 19:07:50 -0500 fx0ne <seyi.akin () gmail com> wrote:Attack Simulation and Threat Modeling is a book that explorestheabundant resources available in advanced security data collection, classification, processing and mining. It attempts to give insight into anumberof alternative methods of security and attack analytics thatleveragemethodologies adopted from various other disciplines inextractingvaluable data to support security research work and chart a course for enterprise security decision making. Synopsis Threat Vectors and Attack Signatures Attack Virtualization and Behavioural analysis Security Event Correlation and Pattern Recognition Exploratory Security Analytics and Threat Hypothesis Machine Learning Algorithms It is released under the GNU FDL v1.3 License and can be downloaded here:http://inverse.com.ng/book2/Attack_Simulation_and_Threat_Modeling.pdf Cheers! Olu -- View this message in context: http://old.nabble.com/Attack- Simulation-and-Threat-Modeling-book-tp27540377p27540377.html Sent from the Penetration Testing mailing list archive at Nabble.com. ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org -----------------------------------------------------------------------------BEGIN PGP SIGNATURE----- Charset: UTF8 Note: This signature can be verified athttps://www.hushtools.com/verifyVersion: Hush 3.0wpwEAQMCAAYFAkuEAGMACgkQeYNX6oZy8rYnJwP/fdUEbpXA5sZiOwCtkpre7MTSVkD JD7EUFfEd/LFAKLc6rTXhvfKHG27T/6COOozgsfG7hQ77/tkvYWH9glulCkSkU+if7z3 39Dx/D63Ga7HpA1MsowoExlARAj2a8Ya2vYO53mDOtZL2pxzTHTtpb/EayErW+NLXvzz 8h3TKA8Q= =GqY/ -----END PGP SIGNATURE----- ------------------------------------------------------------------------This list is sponsored by: Information Assurance CertificationReview BoardProve to peers and potential employers without a doubt that youcan actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.http://www.iacertification.org ------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Charset: UTF8 Version: Hush 3.0 Note: This signature can be verified at https://www.hushtools.com/verify wpwEAQMCAAYFAkuFo9AACgkQeYNX6oZy8rYYkwP/TXE2+P1MrIrQL1cay6UIbniwz9WH Sux5kcHVbJ/N7+PMvZoXzpkbmXYLNUVV28WexJ2gbBeQbB0j1CSik7/Lbb9uy7V77shU zBSFuxQeE3QgC2r2BvZHb07QdNU4rJrxMjfdH/FPyfiZf0dD/2pP8miCXAM8oJstoFgE 6Bpag/E= =s0dS -----END PGP SIGNATURE----- ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Attack Simulation and Threat Modeling book fx0ne (Feb 15)
- <Possible follow-ups>
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 23)
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Message not available
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Re: Attack Simulation and Threat Modeling book Sebastian Schlag (Feb 25)
- Re: Attack Simulation and Threat Modeling book Shawn Merdinger (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)
- Re: Attack Simulation and Threat Modeling book Natalia Inoue (Feb 25)