Difference between revisions of "Books that reference OWASP"

From OWASP
Jump to: navigation, search
 
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Leading Security Books that Reference OWASP==
 
 
 
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters.  Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
 
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters.  Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
  
 +
Here's are just a few of the '''over 50 books''' that reference OWASP:
  
<a href="http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&amp;s=books">
+
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
<img 
+
http://ec2.images-amazon.com/images/P/0735617228.01._PIsitb-st-arrow,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg
alt="Windows Server 2003 (Hacking Exposed)"
+
http://ec2.images-amazon.com/images/P/0072260858.01._PIsitb-st-arrow,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg
src="http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
+
http://ec2.images-amazon.com/images/P/0072253576.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
></a>
+
http://ec2.images-amazon.com/images/P/076372677X.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
 
 
<a href="http://www.amazon.com/Development-Hibernate-Eclipse-Developers-Library/dp/0672328968/sr=1-2/qid=1167776633/ref=sr_1_2/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img
 
alt="Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)"
 
src="http://ec2.images-amazon.com/images/P/0672328968.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V63875509_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Writing-Secure-Second-Michael-Howard/dp/0735617228/sr=1-3/qid=1167776633/ref=sr_1_3/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img
 
alt="Writing Secure Code, Second Edition"
 
src="http://ec2.images-amazon.com/images/P/0735617228.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Deadly-Sins-Software-Security-One-off/dp/0072260858/sr=1-4/qid=1167776633/ref=sr_1_4/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="19 Deadly Sins of Software Security (Security One-off)"
 
src="http://ec2.images-amazon.com/images/P/0072260858.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Beginning-Visual-Basic-Thearon-Willis/dp/0764574019/sr=1-5/qid=1167776633/ref=sr_1_5/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img
 
alt="Beginning Visual Basic 2005"
 
src="http://ec2.images-amazon.com/images/P/0764574019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V48604100_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Testing-Applications-Web-Planning-Internet-Based/dp/0471201006/sr=1-6/qid=1167776633/ref=sr_1_6/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition"
 
src="http://ec2.images-amazon.com/images/P/0471201006.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/JavaScript-Complete-Reference-Thomas-Powell/dp/0072253576/sr=1-7/qid=1167776633/ref=sr_1_7/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="JavaScript: The Complete Reference, Second Edition"
 
src="http://ec2.images-amazon.com/images/P/0072253576.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Microsoft-Visual-Basic-Programmers-Cookbook/dp/073561931X/sr=1-8/qid=1167776633/ref=sr_1_8/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Microsoft Visual Basic .NET Programmer's Cookbook"
 
src="http://ec2.images-amazon.com/images/P/073561931X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Information-Security-Illuminated-Jones-Barlett/dp/076372677X/sr=1-9/qid=1167776633/ref=sr_1_9/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Information Security Illuminated (Jones and Barlett Illuminated)"
 
src="http://ec2.images-amazon.com/images/P/076372677X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Professional-Pen-Testing-Applications-Programmer/dp/0471789666/sr=1-10/qid=1167776633/ref=sr_1_10/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Professional Pen Testing for Web Applications (Programmer to Programmer)"
 
src="http://ec2.images-amazon.com/images/P/0471789666.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Security%2B-Certification-Training-Microsoft-Corporation/dp/0735618224/sr=1-11/qid=1167776633/ref=sr_1_11/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Security+ Certification Training Kit"
 
src="http://ec2.images-amazon.com/images/P/0735618224.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Security-Risk-Assessment-Handbook/dp/0849329981/sr=1-12/qid=1167776633/ref=sr_1_12/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="The Security Risk Assessment Handbook"
 
src="http://ec2.images-amazon.com/images/P/0849329981.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/PHP-Anthology-Object-Oriented-Solution/dp/0957921853/sr=1-13/qid=1167776713/ref=sr_1_13/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="The PHP Anthology: Object Oriented PHP Solution, Volume 1"
 
src="http://ec2.images-amazon.com/images/P/0957921853.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Hackers-Challenge-Network-Security-Forensic/dp/0072226307/sr=1-14/qid=1167776713/ref=sr_1_14/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Hacker's Challenge 2: Test Your Network Security &amp; Forensic Skills"
 
src="http://ec2.images-amazon.com/images/P/0072226307.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Practical-Guide-Security-Assessments/dp/0849317061/sr=1-15/qid=1167776713/ref=sr_1_15/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="A Practical Guide to Security Assessments"
 
src="http://ec2.images-amazon.com/images/P/0849317061.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Oracle-Security-Step-Step-Version/dp/0974372749/sr=1-16/qid=1167776713/ref=sr_1_16/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Oracle Security Step-by-Step (Version 2.0)"
 
src="http://ec2.images-amazon.com/images/P/0974372749.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Perspectives-Web-Services-Real-World-Professional/dp/3540009140/sr=1-17/qid=1167776713/ref=sr_1_17/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Perspectives on Web Services: Applying SOAP, WSDL and UDDI to Real-World Projects (Springer Professional Computing)"
 
src="http://ec2.images-amazon.com/images/P/3540009140.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/BEA-WebLogic-Server-8-Dummies/dp/0764524720/sr=1-18/qid=1167776713/ref=sr_1_18/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="BEA WebLogic Server 8 for Dummies"
 
src="http://ec2.images-amazon.com/images/P/0764524720.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Hacking-Dummies-Kevin-Beaver/dp/076455784X/sr=1-19/qid=1167776713/ref=sr_1_19/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Hacking for Dummies"
 
src="http://ec2.images-amazon.com/images/P/076455784X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50846974_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Software-Vulnerability-Guide-Programming/dp/1584503580/sr=1-20/qid=1167776713/ref=sr_1_20/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="The Software Vulnerability Guide (Programming Series) (Programming Series)"
 
src="http://ec2.images-amazon.com/images/P/1584503580.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Oracle-Security-Handbook-Implement-Environment/dp/0072133252/sr=1-21/qid=1167776713/ref=sr_1_21/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment"
 
src="http://ec2.images-amazon.com/images/P/0072133252.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Special-Ops-Network-Security-Microsoft/dp/1931836698/sr=1-22/qid=1167776713/ref=sr_1_22/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle"
 
src="http://ec2.images-amazon.com/images/P/1931836698.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Hacker-Boot-Camp-Gerald-Quakenbush/dp/097684091X/sr=1-23/qid=1167776713/ref=sr_1_23/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Web Hacker Boot Camp"
 
src="http://ec2.images-amazon.com/images/P/097684091X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66856900_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Innocent-Code-Security-Wake-Up-Programmers/dp/0470857447/sr=1-24/qid=1167776713/ref=sr_1_24/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Innocent Code: A Security Wake-Up Call for Web Programmers"
 
src="http://ec2.images-amazon.com/images/P/0470857447.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Hardening-Network-Security-John-Mallery/dp/0072257032/sr=1-25/qid=1167776734/ref=sr_1_25/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Hardening Network Security"
 
src="http://ec1.images-amazon.com/images/P/0072257032.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Building-Enterprise-Networks-Robert-Shimonski/dp/1931836884/sr=1-26/qid=1167776734/ref=sr_1_26/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Building DMZs for Enterprise Networks"
 
src="http://ec1.images-amazon.com/images/P/1931836884.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Applications-Hacking-Exposed-Joel-Scambray/dp/007222438X/sr=1-27/qid=1167776734/ref=sr_1_27/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Web Applications (Hacking Exposed)"
 
src="http://ec1.images-amazon.com/images/P/007222438X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Computer-Security-21st-Century-D-T/dp/0387240055/sr=1-28/qid=1167776734/ref=sr_1_28/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Computer Security in the 21st Century"
 
src="http://ec1.images-amazon.com/images/P/0387240055.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/NET-Development-Security-Solutions-Mueller/dp/0782142664/sr=1-29/qid=1167776734/ref=sr_1_29/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt=".NET Development Security Solutions"
 
src="http://ec1.images-amazon.com/images/P/0782142664.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Information-Security-Management-Handbook-Fifth/dp/0849319978/sr=1-30/qid=1167776734/ref=sr_1_30/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Information Security Management Handbook, Fifth Edition"
 
src="http://ec1.images-amazon.com/images/P/0849319978.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/HackNotes-Network-Security-Portable-Reference/dp/0072227834/sr=1-31/qid=1167776734/ref=sr_1_31/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="HackNotes(tm) Network Security Portable Reference"
 
src="http://ec1.images-amazon.com/images/P/0072227834.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Computer-Systems-Validation-Management-Pharmaceutical/dp/0849318718/sr=1-32/qid=1167776734/ref=sr_1_32/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healt"
 
src="http://ec1.images-amazon.com/images/P/0849318718.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/HackNotes-Web-Security-Pocket-Reference/dp/0072227842/sr=1-33/qid=1167776734/ref=sr_1_33/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="HackNotes(tm) Web Security Pocket Reference"
 
src="http://ec1.images-amazon.com/images/P/0072227842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Secure-Online-Business-Handbook-Management/dp/0749446420/sr=1-34/qid=1167776734/ref=sr_1_34/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity"
 
src="http://ec1.images-amazon.com/images/P/0749446420.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V37016241_.jpg"
 
></a>
 
 
 
<a href="http://www.amazon.com/Advances-Computer-Science-Management-Proceedings/dp/3540307672/sr=1-35/qid=1167776734/ref=sr_1_35/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Advances in Computer Science - ASIAN 2005. Data Management on the Web: 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings ...        (Lecture Notes in Computer Science)"
 
src="http://ec1.images-amazon.com/images/P/3540307672.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Applied-Cryptography-Network-Security-International/dp/3540202080/sr=1-36/qid=1167776734/ref=sr_1_36/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science)"
 
src="http://ec1.images-amazon.com/images/P/3540202080.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V53966271_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540255842/sr=1-37/qid=1167776753/ref=sr_1_37/102-4910841-8071358?ie=UTF8&amp;s=books">
+
http://ec2.images-amazon.com/images/P/0471789666.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg
<img 
+
http://ec2.images-amazon.com/images/P/0849329981.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg
alt="Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)"
+
http://ec2.images-amazon.com/images/P/0974372749.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
src="http://ec2.images-amazon.com/images/P/3540255842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
+
http://ec2.images-amazon.com/images/P/0470857447.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg
></a>
+
http://ec1.images-amazon.com/images/P/0072227834.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg
  
<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540330526/sr=1-38/qid=1167776753/ref=sr_1_38/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science)"
 
src="http://ec2.images-amazon.com/images/P/3540330526.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54147362_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Business-Guide-Information-Security/dp/0749443952/sr=1-39/qid=1167776753/ref=sr_1_39/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="A Business Guide to Information Security"
 
src="http://ec2.images-amazon.com/images/P/0749443952.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50358246_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Security-Sages-Hardening-Network-Infrastructure/dp/1931836019/sr=1-40/qid=1167776753/ref=sr_1_40/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Security Sage's Guide to Hardening the Network Infrastructure"
 
src="http://ec2.images-amazon.com/images/P/1931836019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Detection-Intrusions-Malware-Vulnerability-Assessment/dp/354036014X/sr=1-41/qid=1167776753/ref=sr_1_41/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science)"
 
src="http://ec2.images-amazon.com/images/P/354036014X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V60787098_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Miller-Information-Technology-Audits-2005/dp/0808089668/sr=1-42/qid=1167776753/ref=sr_1_42/102-4910841-8071358?ie=UTF8&amp;s=books">
+
See the '''[http://books.google.com/books?as_q=owasp&num=100&btnG=Google+Search&as_epq=&as_oq=&as_eq=&as_libcat=0&as_brr=0&as_vt=&as_auth=&as_pub=&as_drrb=c&as_miny=&as_maxy=&as_isbn= full list at Google]'''
<img 
 
alt="Miller Information Technology Audits, 2005"
 
src="http://ec2.images-amazon.com/images/P/0808089668.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66859364_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Technologies-Advanced-Heterogeneous-Networks-Engineering/dp/3540308849/sr=1-43/qid=1167776753/ref=sr_1_43/102-4910841-8071358?ie=UTF8&amp;s=books">
 
<img 
 
alt="Technologies for Advanced Heterogeneous Networks: First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings (Lecture Notes in Computer Science)"
 
src="http://ec2.images-amazon.com/images/P/3540308849.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg"
 
></a>
 
  
<a href="http://www.amazon.com/Frontiers-Research-Development-APWeb-2006/dp/3540311424/sr=1-44/qid=1167776753/ref=sr_1_44/102-4910841-8071358?ie=UTF8&amp;s=books">
+
See the '''[http://www.amazon.com/s/ref=nb_ss_gw/102-4910841-8071358?url=search-alias%3Daps&field-keywords=owasp full list at Amazon]'''
<img 
 
alt="Frontiers of WWW Research and Development -- APWeb 2006: 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings (Lecture Notes in Computer Science)"
 
src="http://ec2.images-amazon.com/images/P/3540311424.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg"
 
></a>
 

Latest revision as of 22:17, 2 January 2007

Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.

Here's are just a few of the over 50 books that reference OWASP:

0072230614.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg 0735617228.01._PIsitb-st-arrow,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg 0072260858.01._PIsitb-st-arrow,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg 0072253576.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg 076372677X.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg


0471789666.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg 0849329981.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg 0974372749.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg 0470857447.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg 0072227834.01._PIsitb-st-arrow,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg



See the full list at Google


See the full list at Amazon