Difference between revisions of "Books that reference OWASP"

From OWASP
Jump to: navigation, search
 
Line 1: Line 1:
==Leading Security Books that Reference OWASP==
 
 
 
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters.  Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
 
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters.  Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
  
 
+
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
<a href="http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&amp;s=books">
+
[[http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&amp;s=books
<img 
+
Windows Server 2003 (Hacking Exposed)]]
alt="Windows Server 2003 (Hacking Exposed)"
+
src="http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Development-Hibernate-Eclipse-Developers-Library/dp/0672328968/sr=1-2/qid=1167776633/ref=sr_1_2/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img
+
alt="Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)"
+
src="http://ec2.images-amazon.com/images/P/0672328968.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V63875509_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Writing-Secure-Second-Michael-Howard/dp/0735617228/sr=1-3/qid=1167776633/ref=sr_1_3/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img
+
alt="Writing Secure Code, Second Edition"
+
src="http://ec2.images-amazon.com/images/P/0735617228.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Deadly-Sins-Software-Security-One-off/dp/0072260858/sr=1-4/qid=1167776633/ref=sr_1_4/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="19 Deadly Sins of Software Security (Security One-off)"
+
src="http://ec2.images-amazon.com/images/P/0072260858.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Beginning-Visual-Basic-Thearon-Willis/dp/0764574019/sr=1-5/qid=1167776633/ref=sr_1_5/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img
+
alt="Beginning Visual Basic 2005"
+
src="http://ec2.images-amazon.com/images/P/0764574019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V48604100_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Testing-Applications-Web-Planning-Internet-Based/dp/0471201006/sr=1-6/qid=1167776633/ref=sr_1_6/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition"
+
src="http://ec2.images-amazon.com/images/P/0471201006.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/JavaScript-Complete-Reference-Thomas-Powell/dp/0072253576/sr=1-7/qid=1167776633/ref=sr_1_7/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="JavaScript: The Complete Reference, Second Edition"
+
src="http://ec2.images-amazon.com/images/P/0072253576.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Microsoft-Visual-Basic-Programmers-Cookbook/dp/073561931X/sr=1-8/qid=1167776633/ref=sr_1_8/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Microsoft Visual Basic .NET Programmer's Cookbook"
+
src="http://ec2.images-amazon.com/images/P/073561931X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Information-Security-Illuminated-Jones-Barlett/dp/076372677X/sr=1-9/qid=1167776633/ref=sr_1_9/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Information Security Illuminated (Jones and Barlett Illuminated)"
+
src="http://ec2.images-amazon.com/images/P/076372677X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Professional-Pen-Testing-Applications-Programmer/dp/0471789666/sr=1-10/qid=1167776633/ref=sr_1_10/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Professional Pen Testing for Web Applications (Programmer to Programmer)"
+
src="http://ec2.images-amazon.com/images/P/0471789666.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Security%2B-Certification-Training-Microsoft-Corporation/dp/0735618224/sr=1-11/qid=1167776633/ref=sr_1_11/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Security+ Certification Training Kit"
+
src="http://ec2.images-amazon.com/images/P/0735618224.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Security-Risk-Assessment-Handbook/dp/0849329981/sr=1-12/qid=1167776633/ref=sr_1_12/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="The Security Risk Assessment Handbook"
+
src="http://ec2.images-amazon.com/images/P/0849329981.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/PHP-Anthology-Object-Oriented-Solution/dp/0957921853/sr=1-13/qid=1167776713/ref=sr_1_13/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="The PHP Anthology: Object Oriented PHP Solution, Volume 1"
+
src="http://ec2.images-amazon.com/images/P/0957921853.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Hackers-Challenge-Network-Security-Forensic/dp/0072226307/sr=1-14/qid=1167776713/ref=sr_1_14/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Hacker's Challenge 2: Test Your Network Security &amp; Forensic Skills"
+
src="http://ec2.images-amazon.com/images/P/0072226307.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Practical-Guide-Security-Assessments/dp/0849317061/sr=1-15/qid=1167776713/ref=sr_1_15/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="A Practical Guide to Security Assessments"
+
src="http://ec2.images-amazon.com/images/P/0849317061.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Oracle-Security-Step-Step-Version/dp/0974372749/sr=1-16/qid=1167776713/ref=sr_1_16/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Oracle Security Step-by-Step (Version 2.0)"
+
src="http://ec2.images-amazon.com/images/P/0974372749.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Perspectives-Web-Services-Real-World-Professional/dp/3540009140/sr=1-17/qid=1167776713/ref=sr_1_17/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Perspectives on Web Services: Applying SOAP, WSDL and UDDI to Real-World Projects (Springer Professional Computing)"
+
src="http://ec2.images-amazon.com/images/P/3540009140.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/BEA-WebLogic-Server-8-Dummies/dp/0764524720/sr=1-18/qid=1167776713/ref=sr_1_18/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="BEA WebLogic Server 8 for Dummies"
+
src="http://ec2.images-amazon.com/images/P/0764524720.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Hacking-Dummies-Kevin-Beaver/dp/076455784X/sr=1-19/qid=1167776713/ref=sr_1_19/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Hacking for Dummies"
+
src="http://ec2.images-amazon.com/images/P/076455784X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50846974_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Software-Vulnerability-Guide-Programming/dp/1584503580/sr=1-20/qid=1167776713/ref=sr_1_20/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="The Software Vulnerability Guide (Programming Series) (Programming Series)"
+
src="http://ec2.images-amazon.com/images/P/1584503580.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Oracle-Security-Handbook-Implement-Environment/dp/0072133252/sr=1-21/qid=1167776713/ref=sr_1_21/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment"
+
src="http://ec2.images-amazon.com/images/P/0072133252.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Special-Ops-Network-Security-Microsoft/dp/1931836698/sr=1-22/qid=1167776713/ref=sr_1_22/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle"
+
src="http://ec2.images-amazon.com/images/P/1931836698.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Hacker-Boot-Camp-Gerald-Quakenbush/dp/097684091X/sr=1-23/qid=1167776713/ref=sr_1_23/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Web Hacker Boot Camp"
+
src="http://ec2.images-amazon.com/images/P/097684091X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66856900_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Innocent-Code-Security-Wake-Up-Programmers/dp/0470857447/sr=1-24/qid=1167776713/ref=sr_1_24/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Innocent Code: A Security Wake-Up Call for Web Programmers"
+
src="http://ec2.images-amazon.com/images/P/0470857447.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Hardening-Network-Security-John-Mallery/dp/0072257032/sr=1-25/qid=1167776734/ref=sr_1_25/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Hardening Network Security"
+
src="http://ec1.images-amazon.com/images/P/0072257032.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Building-Enterprise-Networks-Robert-Shimonski/dp/1931836884/sr=1-26/qid=1167776734/ref=sr_1_26/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Building DMZs for Enterprise Networks"
+
src="http://ec1.images-amazon.com/images/P/1931836884.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Applications-Hacking-Exposed-Joel-Scambray/dp/007222438X/sr=1-27/qid=1167776734/ref=sr_1_27/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Web Applications (Hacking Exposed)"
+
src="http://ec1.images-amazon.com/images/P/007222438X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Computer-Security-21st-Century-D-T/dp/0387240055/sr=1-28/qid=1167776734/ref=sr_1_28/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Computer Security in the 21st Century"
+
src="http://ec1.images-amazon.com/images/P/0387240055.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/NET-Development-Security-Solutions-Mueller/dp/0782142664/sr=1-29/qid=1167776734/ref=sr_1_29/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt=".NET Development Security Solutions"
+
src="http://ec1.images-amazon.com/images/P/0782142664.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Information-Security-Management-Handbook-Fifth/dp/0849319978/sr=1-30/qid=1167776734/ref=sr_1_30/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Information Security Management Handbook, Fifth Edition"
+
src="http://ec1.images-amazon.com/images/P/0849319978.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/HackNotes-Network-Security-Portable-Reference/dp/0072227834/sr=1-31/qid=1167776734/ref=sr_1_31/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="HackNotes(tm) Network Security Portable Reference"
+
src="http://ec1.images-amazon.com/images/P/0072227834.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Computer-Systems-Validation-Management-Pharmaceutical/dp/0849318718/sr=1-32/qid=1167776734/ref=sr_1_32/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healt"
+
src="http://ec1.images-amazon.com/images/P/0849318718.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/HackNotes-Web-Security-Pocket-Reference/dp/0072227842/sr=1-33/qid=1167776734/ref=sr_1_33/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="HackNotes(tm) Web Security Pocket Reference"
+
src="http://ec1.images-amazon.com/images/P/0072227842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Secure-Online-Business-Handbook-Management/dp/0749446420/sr=1-34/qid=1167776734/ref=sr_1_34/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity"
+
src="http://ec1.images-amazon.com/images/P/0749446420.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V37016241_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Advances-Computer-Science-Management-Proceedings/dp/3540307672/sr=1-35/qid=1167776734/ref=sr_1_35/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Advances in Computer Science - ASIAN 2005. Data Management on the Web: 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings ...        (Lecture Notes in Computer Science)"
+
src="http://ec1.images-amazon.com/images/P/3540307672.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Applied-Cryptography-Network-Security-International/dp/3540202080/sr=1-36/qid=1167776734/ref=sr_1_36/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec1.images-amazon.com/images/P/3540202080.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V53966271_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540255842/sr=1-37/qid=1167776753/ref=sr_1_37/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec2.images-amazon.com/images/P/3540255842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540330526/sr=1-38/qid=1167776753/ref=sr_1_38/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec2.images-amazon.com/images/P/3540330526.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54147362_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Business-Guide-Information-Security/dp/0749443952/sr=1-39/qid=1167776753/ref=sr_1_39/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="A Business Guide to Information Security"
+
src="http://ec2.images-amazon.com/images/P/0749443952.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50358246_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Security-Sages-Hardening-Network-Infrastructure/dp/1931836019/sr=1-40/qid=1167776753/ref=sr_1_40/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Security Sage's Guide to Hardening the Network Infrastructure"
+
src="http://ec2.images-amazon.com/images/P/1931836019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Detection-Intrusions-Malware-Vulnerability-Assessment/dp/354036014X/sr=1-41/qid=1167776753/ref=sr_1_41/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec2.images-amazon.com/images/P/354036014X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V60787098_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Miller-Information-Technology-Audits-2005/dp/0808089668/sr=1-42/qid=1167776753/ref=sr_1_42/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Miller Information Technology Audits, 2005"
+
src="http://ec2.images-amazon.com/images/P/0808089668.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66859364_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Technologies-Advanced-Heterogeneous-Networks-Engineering/dp/3540308849/sr=1-43/qid=1167776753/ref=sr_1_43/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Technologies for Advanced Heterogeneous Networks: First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec2.images-amazon.com/images/P/3540308849.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
></a>
+
 
+
<a href="http://www.amazon.com/Frontiers-Research-Development-APWeb-2006/dp/3540311424/sr=1-44/qid=1167776753/ref=sr_1_44/102-4910841-8071358?ie=UTF8&amp;s=books">
+
<img 
+
alt="Frontiers of WWW Research and Development -- APWeb 2006: 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings (Lecture Notes in Computer Science)"
+
src="http://ec2.images-amazon.com/images/P/3540311424.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
></a>
+

Revision as of 21:21, 2 January 2007

Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.

0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg [[http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books Windows Server 2003 (Hacking Exposed)]]