Difference between revisions of "Books that reference OWASP"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
  
 
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
 
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
[[http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books
+
[http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books Windows Server 2003 (Hacking Exposed)]
Windows Server 2003 (Hacking Exposed)]]
+

Revision as of 21:25, 2 January 2007

Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.

0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Windows Server 2003 (Hacking Exposed)