Books that reference OWASP

From OWASP
Revision as of 21:38, 2 January 2007 by OWASP (Talk | contribs)

Jump to: navigation, search

Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.


0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Windows Server 2003 (Hacking Exposed)


0672328968.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V63875509_.jpg Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)


0735617228.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg Writing Secure Code, Second Edition


0072260858.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg 19 Deadly Sins of Software Security (Security One-off)


0764574019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V48604100_.jpg Beginning Visual Basic 2005


0471201006.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition

0072253576.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg JavaScript: The Complete Reference, Second Edition


073561931X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Microsoft Visual Basic .NET Programmer's Cookbook


076372677X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Information Security Illuminated (Jones and Barlett Illuminated)


0471789666.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg Professional Pen Testing for Web Applications (Programmer to Programmer)

0735618224.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg Security+ Certification Training Kit

0849329981.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg The Security Risk Assessment Handbook

0957921853.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg The PHP Anthology: Object Oriented PHP Solution, Volume 1

0072226307.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Hacker's Challenge 2: Test Your Network Security & Forensic Skills

0849317061.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg A Practical Guide to Security Assessments

0974372749.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Oracle Security Step-by-Step (Version 2.0)

3540009140.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Perspectives on Web Services: Applying SOAP, WSDL and UDDI to Real-World Projects (Springer Professional Computing)

0764524720.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg BEA WebLogic Server 8 for Dummies

076455784X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50846974_.jpg Hacking for Dummies

1584503580.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg The Software Vulnerability Guide (Programming Series)

0072133252.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment

1931836698.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle

097684091X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66856900_.jpg Web Hacker Boot Camp


0470857447.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg Innocent Code: A Security Wake-Up Call for Web Programmers

0072257032.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Hardening Network Security

1931836884.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Building DMZs for Enterprise Networks

007222438X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg Web Applications (Hacking Exposed)

0387240055.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Computer Security in the 21st Century

0782142664.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg .NET Development Security Solutions

0849319978.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Information Security Management Handbook, Fifth Edition

0072227834.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg HackNotes(tm) Network Security Portable Reference

0849318718.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healt

0072227842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg HackNotes(tm) Web Security Pocket Reference

0749446420.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V37016241_.jpg The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity

3540307672.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Advances in Computer Science - ASIAN 2005. Data Management on the Web: 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings ... (Lecture Notes in Computer Science)

3540202080.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V53966271_.jpg Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science)

3540255842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)

3540330526.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54147362_.jpg Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science)

0749443952.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50358246_.jpg A Business Guide to Information Security

1931836019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg Security Sage's Guide to Hardening the Network Infrastructure

354036014X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V60787098_.jpg Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science)

0808089668.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66859364_.jpg Miller Information Technology Audits, 2005

3540308849.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg Technologies for Advanced Heterogeneous Networks: First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings (Lecture Notes in Computer Science)

3540311424.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg Frontiers of WWW Research and Development -- APWeb 2006: 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings (Lecture Notes in Computer Science)