This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Testing Guide Appendix B: Suggested Reading"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
Line 1: Line 1:
[http://s1.shard.jp/galeach/new98.html asia company paper pulp ] [http://s1.shard.jp/losaul/australian-momentum.html australian innovation centre ] [http://s1.shard.jp/galeach/new164.html gay asian men videos ] [http://s1.shard.jp/bireba/kaspersky-antivirus.html antivirus+avg ] [http://s1.shard.jp/galeach/ clubasian ] [http://s1.shard.jp/losaul/australian-vets.html superannuation australian government ] [http://s1.shard.jp/galeach/new76.html asian school girl movie ] [http://s1.shard.jp/losaul/online-computer.html 1992 events australia ] [http://s1.shard.jp/bireba/eztrust-antivirus.html download antivirus for free ] [http://s1.shard.jp/bireba/antivirus-software.html windows 2000 server antivirus free ] [http://s1.shard.jp/bireba/avg-antivirus.html uninstall norton antivirus corporate ] [http://s1.shard.jp/olharder/tactical-automated.html auto meter.com ] [http://s1.shard.jp/olharder/autopilots-for.html dura automotive ] [http://s1.shard.jp/olharder/autoroll-654.html webmap] [http://s1.shard.jp/frhorton/2i2g9o8vi.html thermal bath south africa ] [http://s1.shard.jp/olharder/stevens-creek.html homan auto ] [http://s1.shard.jp/bireba/antivirus-personal.html kaspersky antivirus cracks ] [http://s1.shard.jp/losaul/australia-immigration.html timber framing code of australia ] [http://s1.shard.jp/losaul/1999-australian.html australia tourist visa uk ] [http://s1.shard.jp/olharder/autoroll-654.html site] [http://s1.shard.jp/olharder/ch-futterautomat.html automated fingerprint identification ] [http://s1.shard.jp/galeach/new153.html excerpta medica asia ] [http://s1.shard.jp/losaul/simple-plan.html boatbuilders australia ] [http://s1.shard.jp/frhorton/77iqsoujy.html african american in black history ] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/olharder/automobile-dealer.html auction auto garden state ] [http://s1.shard.jp/losaul/australian-emus.html australian plant pond ] [http://s1.shard.jp/frhorton/77murrpay.html colonial rule of africa ] [http://s1.shard.jp/olharder/celebrity-autograph.html automated link program reciprocal relevant ] [http://s1.shard.jp/olharder/autoroll-654.html links] [http://s1.shard.jp/galeach/new93.html asian ladyboy movie gallery] [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus 2003 software ] [http://s1.shard.jp/galeach/new24.html eaton vance asian small companies ] [http://s1.shard.jp/galeach/new27.html asia carrera pic tgp.glamourmodelsgonebad.com ] [http://s1.shard.jp/losaul/australia-desert.html aprenticeships australia ] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/bireba/stinger-antivirus.html mccaffrey antivirus ] [http://s1.shard.jp/bireba/extendia-antivirus.html cyberscrub antivirus review ] [http://s1.shard.jp/frhorton/6znbfza3k.html african wildlife fund ] [http://s1.shard.jp/losaul/australian-sports.html inpress magazine australia ] [http://s1.shard.jp/olharder/teleflex-automotive.html automatic best coffee maker ] [http://s1.shard.jp/galeach/new33.html what is hip dysplasia in dogs ] [http://s1.shard.jp/frhorton/mz6vv73zx.html african hand drumming ] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/frhorton/te8ykt7rl.html poem written by african american ] [http://s1.shard.jp/olharder/auto-sales-winnies.html auto sales winnies] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/losaul/australian-oil.html commonweath bank of australia ] [http://s1.shard.jp/bireba/vet-antivirus.html antivirus scanner free download ] [http://s1.shard.jp/losaul/australia-transcriber.html embajada de australia en colombia ] 
 
 
{{Template:OWASP Testing Guide v3}}
 
{{Template:OWASP Testing Guide v3}}
  
Line 32: Line 31:
 
* Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
 
* Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)'' - http://www.securecoding.org
+
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)'' - http://www.securecoding.org
  
 
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X (2002) - http://www.buildingsecuresoftware.com
 
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X (2002) - http://www.buildingsecuresoftware.com
Line 46: Line 45:
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462 - http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462 - http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html
  
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
+
* ''The Unified Modeling Language A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
  
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
Line 54: Line 53:
 
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999) - http://www.securingjava.com
 
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999) - http://www.securingjava.com
  
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
+
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
  
 
[[Category:FIXME|broken links, I left them above  
 
[[Category:FIXME|broken links, I left them above  
Line 63: Line 62:
 
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003) http://www.microsoft.com/mspress/books/5957.asp
 
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003) http://www.microsoft.com/mspress/books/5957.asp
  
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
+
* ''The Unified Modeling Language A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
  
  
Line 70: Line 69:
 
==Useful Websites==
 
==Useful Websites==
  
* OWASP — http://www.owasp.org
+
* OWASP http://www.owasp.org
  
 
* SANS - http://www.sans.org
 
* SANS - http://www.sans.org
  
* Secure Coding — http://www.securecoding.org
+
* Secure Coding http://www.securecoding.org
  
 
* Secure Coding Guidelines for the .NET Framework''''' ''''' - http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp
 
* Secure Coding Guidelines for the .NET Framework''''' ''''' - http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp
  
* Security in the Java platform  — http://java.sun.com/security
+
* Security in the Java platform  http://java.sun.com/security
  
* OASIS WAS XML — http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was
+
* OASIS WAS XML http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was

Revision as of 13:00, 29 May 2009

OWASP Testing Guide v3 Table of Contents

This article is part of the OWASP Testing Guide v3. The entire OWASP Testing Guide v3 can be downloaded here.

OWASP at the moment is working at the OWASP Testing Guide v4: you can browse the Guide here

Whitepapers

Books

  • James S. Tiller: "The Ethical Hack: A Framework for Business Value Penetration Testing", Auerbach, ISBN: 084931609X
  • Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  • Web Applications (Hacking Exposed) by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  • Software Testing In The Real World (Acm Press Books) by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
  • Beizer, Boris, Software Testing Techniques, 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720

Useful Websites