Difference between revisions of "OWASP Testing Guide Appendix B: Suggested Reading"

From OWASP
Jump to: navigation, search
Line 71: Line 71:
 
* Build Security In - https://buildsecurityin.us-cert.gov/bsi/home.html
 
* Build Security In - https://buildsecurityin.us-cert.gov/bsi/home.html
  
* Build Security In – Security-Specific Bibliography -
+
* Build Security In – Security-Specific Bibliography - https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/measurement/1070-BSI.html
https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/measurement/1070-BSI.html
+
  
 
* CERT Secure Coding - http://www.cert.org/secure-coding/
 
* CERT Secure Coding - http://www.cert.org/secure-coding/

Revision as of 11:03, 21 November 2012

This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project

Whitepapers

Books

  • James S. Tiller: "The Ethical Hack: A Framework for Business Value Penetration Testing", Auerbach, ISBN: 084931609X
  • Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  • Web Applications (Hacking Exposed) by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  • Software Testing In The Real World (Acm Press Books) by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
  • Beizer, Boris, Software Testing Techniques, 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720

Useful Websites

Videos

Deliberately Insecure Web Applications

  • Hacme Series from McAfee: